ffe}, 0x4) 19:56:59 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:56:59 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:56:59 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:56:59 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') r3 = accept(r1, 0x0, &(0x7f0000000280)) ioctl$SIOCAX25NOUID(r3, 0x89e3, &(0x7f00000002c0)=0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x1, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) 19:56:59 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0x0, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280), &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 417.889340] Restarting kernel threads ... done. 19:56:59 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:56:59 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:56:59 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:56:59 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:00 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') r3 = accept(r1, 0x0, &(0x7f0000000280)) ioctl$SIOCAX25NOUID(r3, 0x89e3, &(0x7f00000002c0)=0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x1, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) [ 418.149075] Restarting kernel threads ... done. 19:57:00 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:00 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:00 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:00 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:00 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0x0, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280), &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:00 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') r3 = accept(r1, 0x0, &(0x7f0000000280)) ioctl$SIOCAX25NOUID(r3, 0x89e3, &(0x7f00000002c0)=0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x1, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) close(r1) [ 418.435220] Restarting kernel threads ... done. 19:57:00 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:00 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:00 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0x76, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:00 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') r3 = accept(r1, 0x0, &(0x7f0000000280)) ioctl$SIOCAX25NOUID(r3, 0x89e3, &(0x7f00000002c0)=0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x1, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) close(r1) 19:57:00 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') r3 = accept(r1, 0x0, &(0x7f0000000280)) ioctl$SIOCAX25NOUID(r3, 0x89e3, &(0x7f00000002c0)=0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x1, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) close(r1) [ 418.797386] Restarting kernel threads ... done. 19:57:00 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:00 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r4, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(0xffffffffffffffff, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:00 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0x76, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:00 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:00 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') r3 = accept(r1, 0x0, &(0x7f0000000280)) ioctl$SIOCAX25NOUID(r3, 0x89e3, &(0x7f00000002c0)=0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x1, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) close(r1) [ 418.970220] Restarting kernel threads ... done. 19:57:00 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:01 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:01 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') r3 = accept(r1, 0x0, &(0x7f0000000280)) ioctl$SIOCAX25NOUID(r3, 0x89e3, &(0x7f00000002c0)=0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x1, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) close(r1) 19:57:01 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 419.187001] Restarting kernel threads ... done. 19:57:01 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r4, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(0xffffffffffffffff, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:01 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r4, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:01 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:01 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0x76, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:01 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:01 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r4, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(0xffffffffffffffff, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:01 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:01 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xb1, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfd", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 419.526359] Restarting kernel threads ... 19:57:01 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r4, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) [ 419.560024] done. 19:57:01 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:01 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:01 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:01 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0x76, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 419.770286] Restarting kernel threads ... done. 19:57:01 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r4, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:01 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:01 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:01 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:01 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:01 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xb1, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfd", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:02 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 420.107388] Restarting kernel threads ... done. 19:57:02 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xb1, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfd", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:02 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:02 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:02 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:02 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) r2 = syz_open_procfs(0x0, 0x0) readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r4, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 420.425681] Restarting kernel threads ... done. 19:57:02 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:02 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xce, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc9820607508", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:02 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xb1, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfd", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:02 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:02 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:02 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) r2 = syz_open_procfs(0x0, 0x0) readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r4, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 420.760290] Restarting kernel threads ... done. 19:57:02 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) r2 = syz_open_procfs(0x0, 0x0) readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r4, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:02 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:02 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xce, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc9820607508", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:02 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:02 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:03 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:03 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:03 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xce, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc9820607508", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:03 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:03 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:03 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:03 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 421.319642] Restarting kernel threads ... done. 19:57:03 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:03 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) [ 421.477582] Restarting kernel threads ... done. 19:57:03 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:03 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:03 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:03 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xdd, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:03 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) [ 421.768809] Restarting kernel threads ... done. 19:57:03 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:03 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xdd, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:03 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000080)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) r2 = syz_open_procfs(0x0, 0x0) readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(0xffffffffffffffff, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r4, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, r0, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:04 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:04 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:04 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:04 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xdd, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:04 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000080)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) r2 = syz_open_procfs(0x0, 0x0) readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(0xffffffffffffffff, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r4, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, r0, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:04 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:04 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe4, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f98", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:04 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:04 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:04 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000080)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) r2 = syz_open_procfs(0x0, 0x0) readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(0xffffffffffffffff, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r4, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, r0, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:04 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:04 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:04 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:04 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:04 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:04 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe4, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f98", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:04 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:04 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe4, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f98", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:04 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:04 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:04 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:04 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:05 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:05 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:05 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:05 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:05 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:05 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:05 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:05 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:05 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:05 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:05 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:05 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 19:57:05 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:05 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:05 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:05 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:05 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:06 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 19:57:06 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:06 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:06 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:06 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 19:57:06 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe5, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:06 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:06 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:06 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:06 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe5, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:06 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(0xffffffffffffffff, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:06 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:06 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:06 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) [ 424.865834] Restarting kernel threads ... done. 19:57:06 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe5, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:06 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:06 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:06 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:06 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(0xffffffffffffffff, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:07 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:07 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe7, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:07 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:07 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:07 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(0xffffffffffffffff, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:07 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) [ 425.387074] Restarting kernel threads ... done. 19:57:07 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:07 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe7, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:07 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:07 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:07 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:07 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:07 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:07 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe7, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:07 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:07 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:07 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:07 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", 0x0) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:08 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:08 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], 0x0, 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:08 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:08 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:08 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:08 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:08 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], 0x0, 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:08 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:08 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:08 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", 0x0) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:08 executing program 2: [ 426.597488] Restarting kernel threads ... [ 426.608360] done. 19:57:08 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:08 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], 0x0, 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:08 executing program 2: 19:57:08 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", 0x0) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:08 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:08 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:08 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:08 executing program 2: 19:57:08 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:09 executing program 2: 19:57:09 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) [ 427.137274] Restarting kernel threads ... done. 19:57:09 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(0x0, 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:09 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:09 executing program 2: 19:57:09 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:09 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:09 executing program 2: 19:57:09 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(0x0, 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:09 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:09 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:09 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:09 executing program 2: 19:57:09 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:09 executing program 2: 19:57:09 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(0x0, 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 427.715094] Restarting kernel threads ... done. 19:57:09 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:09 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:09 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:09 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:09 executing program 2: 19:57:09 executing program 2: 19:57:10 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:10 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000080)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(0xffffffffffffffff, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, r0, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:10 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:10 executing program 2: 19:57:10 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:10 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:10 executing program 2: 19:57:10 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:10 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:10 executing program 2: 19:57:10 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:10 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:10 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:10 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000080)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(0xffffffffffffffff, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, r0, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:10 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x4) 19:57:10 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x227d, &(0x7f0000000200)) 19:57:10 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:10 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0xe, 0x4, 0x4, 0x3, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x2}, 0x3c) 19:57:10 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:10 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x227d, &(0x7f0000000200)) 19:57:10 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000080)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(0xffffffffffffffff, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, r0, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:10 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='sit0\x00', 0x7) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 19:57:11 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:11 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:11 executing program 2: 19:57:11 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:11 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(0xffffffffffffffff, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:11 executing program 2: 19:57:11 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:11 executing program 4: r0 = open(&(0x7f0000000180)='./file1\x00', 0x141042, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0506617, 0x0) 19:57:11 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(0xffffffffffffffff, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:11 executing program 3: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:11 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x10000000000004}, 0x1c) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0xc}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}, 0xffffffffffffffff}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005fc0), 0xa9, 0x0) 19:57:11 executing program 4: pipe(&(0x7f0000000440)) r0 = memfd_create(&(0x7f0000000200)='queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x20a81) r2 = dup2(r1, r0) write$P9_RLINK(r2, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 19:57:11 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:11 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:11 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(0xffffffffffffffff, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:12 executing program 3: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:12 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, 0x0) readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:12 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') preadv(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/122, 0x7a}], 0x1, 0x35) 19:57:12 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:12 executing program 3: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:12 executing program 2: socket$inet(0x2c, 0x3, 0xa0) 19:57:12 executing program 2: r0 = open(&(0x7f0000000180)='./file1\x00', 0x141042, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0x40086607, 0x0) 19:57:12 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, 0x0) readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:12 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="70a53c3ea0d032135402b3d3125b368e9e50f25052a918dc955cb0be9640e265424c785a7d18d6538cfad105dc6ee8d49d58759c90161b74f6d6a52d84abcdf9e9e6ade268964a8d8cd4b629116cb34025212ec46756bdf715", @ANYBLOB="090224b6"], 0x0, 0x6f}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 19:57:12 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x3, 0x0, 0x0) 19:57:12 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:12 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:12 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:12 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, 0x0) readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:12 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'syz_tun\x00\x00\x00\x02\x00\x01\b\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0xfffffffffffffeab, &(0x7f0000000040)={&(0x7f0000000000)=@ipv6_newaddr={0x34, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_FLAGS={0x8, 0x8, 0x284}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x34}}, 0x0) 19:57:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@dellink={0x20, 0x66, 0x30479e840602a76b}, 0x20}}, 0x0) 19:57:12 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:12 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:13 executing program 2: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) add_key(&(0x7f00000000c0)='keyring\x00', 0x0, 0x0, 0x0, r0) 19:57:13 executing program 4: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, r2) 19:57:13 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:13 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:13 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:13 executing program 2: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) sendfile(r1, r0, 0x0, 0x72439a6b) 19:57:13 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:13 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:13 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:13 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 431.546990] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.2'. 19:57:13 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 431.642131] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.2'. 19:57:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) [ 431.856469] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.2'. 19:57:13 executing program 4: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="740000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="0000f60300000000010000000c000100726f75746500000044000200400005003c0001000000546ff9124edf796500"/77], 0x74}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:57:13 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:13 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:13 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:13 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 432.072271] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.2'. 19:57:14 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:14 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vsock\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000d00)={0x2, 0x0, @broadcast}, 0x35) sendmmsg(r0, &(0x7f000000af00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x800) 19:57:14 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:14 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 432.398480] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.2'. [ 432.400003] protocol 88fb is buggy, dev hsr_slave_0 [ 432.412975] protocol 88fb is buggy, dev hsr_slave_1 19:57:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:14 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:14 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 19:57:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400add427323b470c458c560a", 0x11}], 0x1) close(0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x20000000010005, 0x0) 19:57:14 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) [ 432.761286] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=29093 comm=syz-executor.4 19:57:14 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 19:57:14 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:14 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x0, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 432.870762] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=29093 comm=syz-executor.4 19:57:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:14 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) [ 432.999260] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=29093 comm=syz-executor.4 [ 433.026575] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=29093 comm=syz-executor.4 19:57:15 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x0, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 433.100698] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=29093 comm=syz-executor.4 [ 433.133479] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=29093 comm=syz-executor.4 19:57:15 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:15 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, 0x0, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:15 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440), 0x4) [ 433.148812] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=29093 comm=syz-executor.4 [ 433.243410] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=29093 comm=syz-executor.4 [ 433.286869] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=29093 comm=syz-executor.4 [ 433.299591] protocol 88fb is buggy, dev hsr_slave_0 [ 433.299647] protocol 88fb is buggy, dev hsr_slave_1 [ 433.321248] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=29093 comm=syz-executor.4 19:57:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0xc000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000200)={0x0, {}, 0x2, 0x14000000}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "f28e434ebf5e9787", "989c488c1ddfc1a8fe455c25e4e25f1f", "bdf80d78", "3f801c42a40380dc"}, 0x28) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000080)={0x7305, 0x6, 0x81, 0x8, 0x7fffffff}, 0x14) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r4 = syz_open_dev$dmmidi(0x0, 0xcc, 0x180400) ioctl$UFFDIO_WAKE(r4, 0x8010aa02, &(0x7f0000000180)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) 19:57:15 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:15 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, 0x0, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:15 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x0, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:15 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:15 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440), 0x4) 19:57:15 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, 0x0, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:15 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0x0) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 433.813840] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:57:15 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:15 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r0, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) [ 433.871412] tls_set_device_offload_rx: netdev lo with no TLS offload 19:57:15 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:16 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r0, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0xc000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000200)={0x0, {}, 0x2, 0x14000000}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "f28e434ebf5e9787", "989c488c1ddfc1a8fe455c25e4e25f1f", "bdf80d78", "3f801c42a40380dc"}, 0x28) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000080)={0x7305, 0x6, 0x81, 0x8, 0x7fffffff}, 0x14) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r4 = syz_open_dev$dmmidi(0x0, 0xcc, 0x180400) ioctl$UFFDIO_WAKE(r4, 0x8010aa02, &(0x7f0000000180)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) 19:57:16 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0x0) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:16 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:16 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r0, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:16 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440), 0x4) 19:57:16 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) [ 434.394137] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:57:16 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0x0) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:16 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:16 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 434.518072] tls_set_device_offload_rx: netdev lo with no TLS offload 19:57:16 executing program 1: 19:57:16 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:16 executing program 1: 19:57:16 executing program 4: 19:57:16 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:16 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:16 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:16 executing program 1: 19:57:16 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:16 executing program 4: 19:57:16 executing program 1: 19:57:16 executing program 2: socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r0, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:16 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:17 executing program 4: 19:57:17 executing program 1: 19:57:17 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:17 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:17 executing program 1: 19:57:17 executing program 4: 19:57:17 executing program 2: socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r0, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:17 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:17 executing program 1: 19:57:17 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:17 executing program 4: 19:57:17 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:17 executing program 1: 19:57:17 executing program 2: socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r0, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:17 executing program 4: 19:57:17 executing program 1: 19:57:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, 0x0, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:17 executing program 4: 19:57:17 executing program 1: 19:57:17 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:17 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:17 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:17 executing program 1: [ 435.919964] protocol 88fb is buggy, dev hsr_slave_0 [ 435.925096] protocol 88fb is buggy, dev hsr_slave_1 19:57:17 executing program 4: 19:57:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, 0x0, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:18 executing program 1: inotify_init1(0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) unshare(0x0) mq_open(&(0x7f00000000c0)=':md5sum\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:57:18 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:18 executing program 4: mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x18a, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000080)={0x1ae}, 0xffc4) 19:57:18 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:18 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, 0x0, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:18 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:18 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:18 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:18 executing program 4: r0 = socket$kcm(0x2b, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff407000000000f2ffbc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) 19:57:18 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:19 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, 0x0) readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:19 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x0) 19:57:19 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:19 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:19 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:19 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(0xffffffffffffffff, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:19 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:19 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:19 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000080)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(0xffffffffffffffff, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, r0, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:19 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) 19:57:19 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:19 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, 0x0, &(0x7f0000000380)) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) 19:57:19 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:19 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:19 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) 19:57:19 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:20 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, 0x0, &(0x7f0000000380)) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:20 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:20 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:20 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:20 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 19:57:20 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, 0x0, &(0x7f0000000380)) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:20 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:20 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 19:57:20 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3305, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 19:57:20 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), 0x0) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:20 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:20 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 19:57:20 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:20 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:20 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:20 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), 0x0) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:20 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 19:57:20 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:20 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:20 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:21 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 19:57:21 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:21 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 19:57:21 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), 0x0) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:21 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:21 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:21 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x0, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:21 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, 0x0, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:21 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x0, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:21 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:21 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:21 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(0xffffffffffffffff, r1, 0x0, 0x72439a6b) 19:57:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x0, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:21 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, 0x0, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:22 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:22 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, 0x0, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:22 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:22 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, 0x0, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 440.320031] protocol 88fb is buggy, dev hsr_slave_0 [ 440.325165] protocol 88fb is buggy, dev hsr_slave_1 19:57:22 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, 0x0, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:22 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:22 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(0xffffffffffffffff, r1, 0x0, 0x72439a6b) 19:57:22 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:22 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:22 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:22 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, 0x0, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:22 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(0xffffffffffffffff, r1, 0x0, 0x72439a6b) 19:57:22 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:22 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:22 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x0, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 440.989438] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.2'. 19:57:23 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:23 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:23 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:23 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x0, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:23 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) sendfile(r2, r1, 0x0, 0x72439a6b) [ 441.315017] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.2'. 19:57:23 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:23 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:23 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x0, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:23 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:23 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) [ 441.590837] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.2'. [ 441.606269] protocol 88fb is buggy, dev hsr_slave_0 [ 441.606324] protocol 88fb is buggy, dev hsr_slave_1 19:57:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:23 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:23 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:23 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:23 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:23 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x72439a6b) 19:57:24 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:24 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:24 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:24 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:24 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x72439a6b) 19:57:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x24, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}}, 0x24}}, 0x0) 19:57:24 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:24 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:24 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x24, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}}, 0x24}}, 0x0) 19:57:24 executing program 4 (fault-call:24 fault-nth:0): openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:24 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:24 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x72439a6b) 19:57:24 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x24, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}}, 0x24}}, 0x0) 19:57:24 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:24 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:24 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(0xffffffffffffffff, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:24 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:25 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:25 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:25 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:25 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:25 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xffffffffffffeffe}, 0x3) 19:57:25 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:25 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(0xffffffffffffffff, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:25 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:25 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:25 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, 0x0, &(0x7f0000000380)) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:25 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x72439a6b) 19:57:25 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000005c0)={0x0, {0x2, 0x4e20, @broadcast}, {0x2, 0x4e23, @remote}, {0x2, 0x4e24, @multicast2}, 0x102, 0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)='netdevsim0\x00', 0x3, 0x7, 0xd1}) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r6, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r7 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r7, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:25 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(0xffffffffffffffff, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:25 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:25 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, 0x0, &(0x7f0000000380)) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:25 executing program 2 (fault-call:3 fault-nth:0): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:26 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, 0x0, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:26 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000080)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(0xffffffffffffffff, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, r0, 0x0, 0x72439a6b) 19:57:26 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff, 0x7fff}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) accept$netrom(r7, 0x0, &(0x7f00000003c0)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 444.211512] FAULT_INJECTION: forcing a failure. [ 444.211512] name failslab, interval 1, probability 0, space 0, times 1 [ 444.250426] protocol 88fb is buggy, dev hsr_slave_0 [ 444.255977] protocol 88fb is buggy, dev hsr_slave_1 [ 444.283730] CPU: 1 PID: 31888 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 444.290794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.300164] Call Trace: [ 444.302767] dump_stack+0x172/0x1f0 [ 444.306427] should_fail.cold+0xa/0x1b [ 444.310345] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 444.315494] ? lock_downgrade+0x810/0x810 [ 444.319669] __should_failslab+0x121/0x190 [ 444.323925] should_failslab+0x9/0x14 [ 444.327747] kmem_cache_alloc_node+0x26c/0x710 [ 444.332369] __alloc_skb+0xd5/0x5f0 [ 444.336277] ? skb_scrub_packet+0x490/0x490 [ 444.340705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.346264] ? netlink_autobind.isra.0+0x228/0x310 [ 444.351209] netlink_sendmsg+0x97b/0xd70 [ 444.355374] ? netlink_unicast+0x720/0x720 [ 444.359616] ? selinux_socket_sendmsg+0x36/0x40 [ 444.365112] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.370667] ? security_socket_sendmsg+0x8d/0xc0 [ 444.375454] ? netlink_unicast+0x720/0x720 [ 444.379713] sock_sendmsg+0xd7/0x130 19:57:26 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:26 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, 0x0, &(0x7f0000000380)) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 444.383447] ___sys_sendmsg+0x803/0x920 [ 444.387702] ? copy_msghdr_from_user+0x430/0x430 [ 444.392484] ? lock_downgrade+0x810/0x810 [ 444.396919] ? kasan_check_read+0x11/0x20 [ 444.401202] ? __fget+0x367/0x540 [ 444.404679] ? iterate_fd+0x360/0x360 [ 444.408506] ? __fget_light+0x1a9/0x230 [ 444.412591] ? __fdget+0x1b/0x20 [ 444.415980] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 444.421576] __sys_sendmsg+0x105/0x1d0 [ 444.421591] ? __ia32_sys_shutdown+0x80/0x80 [ 444.421619] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 444.421632] ? do_syscall_64+0x26/0x620 [ 444.421648] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.421660] ? do_syscall_64+0x26/0x620 [ 444.421678] __x64_sys_sendmsg+0x78/0xb0 [ 444.421696] do_syscall_64+0xfd/0x620 [ 444.430164] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.430177] RIP: 0033:0x459a29 19:57:26 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, 0x0, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 444.430190] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 444.430198] RSP: 002b:00007f7e14a8cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 444.430213] RAX: ffffffffffffffda RBX: 00007f7e14a8cc90 RCX: 0000000000459a29 [ 444.430219] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 444.430227] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 444.430235] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7e14a8d6d4 [ 444.430242] R13: 00000000004c7979 R14: 00000000004dd398 R15: 0000000000000005 19:57:26 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:26 executing program 2 (fault-call:3 fault-nth:1): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:26 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000080)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(0xffffffffffffffff, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, r0, 0x0, 0x72439a6b) 19:57:26 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f00000003c0)=0x1) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) lsetxattr$security_capability(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='security.capability\x00', &(0x7f0000000640)=@v2={0x2000000, [{0x6, 0x47}, {0x7f, 0x371}]}, 0x14, 0x1) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) ioctl$SCSI_IOCTL_GET_PCI(r5, 0x5387, &(0x7f0000000680)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:26 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:26 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), 0x0) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 444.767698] FAULT_INJECTION: forcing a failure. [ 444.767698] name failslab, interval 1, probability 0, space 0, times 0 [ 444.813187] CPU: 1 PID: 32015 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 444.820175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.829543] Call Trace: [ 444.832185] dump_stack+0x172/0x1f0 [ 444.835847] should_fail.cold+0xa/0x1b [ 444.841118] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 444.846260] ? lock_downgrade+0x810/0x810 [ 444.850552] __should_failslab+0x121/0x190 [ 444.854816] should_failslab+0x9/0x14 [ 444.858667] kmem_cache_alloc_node_trace+0x274/0x720 [ 444.863772] ? __alloc_skb+0xd5/0x5f0 [ 444.863792] __kmalloc_node_track_caller+0x3d/0x80 [ 444.863806] __kmalloc_reserve.isra.0+0x40/0xf0 [ 444.863821] __alloc_skb+0x10b/0x5f0 [ 444.863835] ? skb_scrub_packet+0x490/0x490 [ 444.863850] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.863862] ? netlink_autobind.isra.0+0x228/0x310 [ 444.863886] netlink_sendmsg+0x97b/0xd70 [ 444.885420] protocol 88fb is buggy, dev hsr_slave_0 [ 444.885829] ? netlink_unicast+0x720/0x720 [ 444.885852] ? selinux_socket_sendmsg+0x36/0x40 [ 444.891954] protocol 88fb is buggy, dev hsr_slave_1 [ 444.896556] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.896573] ? security_socket_sendmsg+0x8d/0xc0 [ 444.896586] ? netlink_unicast+0x720/0x720 [ 444.896605] sock_sendmsg+0xd7/0x130 [ 444.914665] ___sys_sendmsg+0x803/0x920 [ 444.914686] ? copy_msghdr_from_user+0x430/0x430 [ 444.930105] ? lock_downgrade+0x810/0x810 [ 444.930125] ? kasan_check_read+0x11/0x20 [ 444.930143] ? __fget+0x367/0x540 [ 444.930158] ? iterate_fd+0x360/0x360 [ 444.930183] ? __fget_light+0x1a9/0x230 [ 444.946888] ? __fdget+0x1b/0x20 [ 444.966367] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 444.975262] __sys_sendmsg+0x105/0x1d0 [ 444.979171] ? __ia32_sys_shutdown+0x80/0x80 [ 444.983608] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 444.988384] ? do_syscall_64+0x26/0x620 [ 444.992372] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.997742] ? do_syscall_64+0x26/0x620 [ 445.001726] __x64_sys_sendmsg+0x78/0xb0 [ 445.001742] do_syscall_64+0xfd/0x620 [ 445.001762] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.001772] RIP: 0033:0x459a29 [ 445.001785] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 445.001792] RSP: 002b:00007f7e14a8cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 445.001805] RAX: ffffffffffffffda RBX: 00007f7e14a8cc90 RCX: 0000000000459a29 [ 445.001812] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 19:57:27 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:27 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000080)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(0xffffffffffffffff, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r1, r0, 0x0, 0x72439a6b) 19:57:27 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, 0x0, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 445.001823] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 445.044816] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7e14a8d6d4 [ 445.074402] R13: 00000000004c7979 R14: 00000000004dd398 R15: 0000000000000005 [ 445.083881] protocol 88fb is buggy, dev hsr_slave_0 [ 445.089166] protocol 88fb is buggy, dev hsr_slave_1 19:57:27 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:27 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), 0x0) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:27 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xfffffffffffffd6c, 0x5b}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'streebog512-generic\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759d26f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4042f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c83450bea6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:27 executing program 2 (fault-call:3 fault-nth:2): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:27 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:27 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), 0x0) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:27 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) [ 445.576198] FAULT_INJECTION: forcing a failure. [ 445.576198] name failslab, interval 1, probability 0, space 0, times 0 [ 445.600000] protocol 88fb is buggy, dev hsr_slave_0 [ 445.605134] protocol 88fb is buggy, dev hsr_slave_1 [ 445.616765] CPU: 1 PID: 32052 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 445.623747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.633117] Call Trace: [ 445.635730] dump_stack+0x172/0x1f0 [ 445.639389] should_fail.cold+0xa/0x1b [ 445.643305] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 445.648442] ? netlink_deliver_tap+0x146/0xc20 [ 445.653093] __should_failslab+0x121/0x190 [ 445.657468] should_failslab+0x9/0x14 [ 445.661592] kmem_cache_alloc+0x47/0x700 [ 445.665857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.671416] ? check_preemption_disabled+0x48/0x290 [ 445.676748] ? lock_acquire+0x16f/0x3f0 [ 445.681386] skb_clone+0x156/0x3e0 [ 445.685496] netlink_deliver_tap+0x97b/0xc20 [ 445.690205] netlink_unicast+0x5a8/0x720 [ 445.694395] ? netlink_attachskb+0x770/0x770 [ 445.699349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.705004] netlink_sendmsg+0x8ae/0xd70 [ 445.709359] ? netlink_unicast+0x720/0x720 [ 445.713627] ? selinux_socket_sendmsg+0x36/0x40 [ 445.718330] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.723901] ? security_socket_sendmsg+0x8d/0xc0 [ 445.728676] ? netlink_unicast+0x720/0x720 [ 445.732938] sock_sendmsg+0xd7/0x130 [ 445.736679] ___sys_sendmsg+0x803/0x920 [ 445.740702] ? copy_msghdr_from_user+0x430/0x430 [ 445.745498] ? lock_downgrade+0x810/0x810 [ 445.749690] ? kasan_check_read+0x11/0x20 [ 445.753876] ? __fget+0x367/0x540 [ 445.757369] ? iterate_fd+0x360/0x360 [ 445.761218] ? __fget_light+0x1a9/0x230 [ 445.765229] ? __fdget+0x1b/0x20 [ 445.768722] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 445.774289] __sys_sendmsg+0x105/0x1d0 [ 445.778195] ? __ia32_sys_shutdown+0x80/0x80 [ 445.782648] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 445.787430] ? do_syscall_64+0x26/0x620 [ 445.791422] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.796801] ? do_syscall_64+0x26/0x620 [ 445.796829] __x64_sys_sendmsg+0x78/0xb0 [ 445.804944] do_syscall_64+0xfd/0x620 [ 445.804965] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.804979] RIP: 0033:0x459a29 [ 445.817145] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 445.836070] RSP: 002b:00007f7e14a8cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 445.843886] RAX: ffffffffffffffda RBX: 00007f7e14a8cc90 RCX: 0000000000459a29 [ 445.851175] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 445.858548] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 445.868622] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7e14a8d6d4 19:57:27 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x0, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:27 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:27 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000040)='-27.0.0.1\n', &(0x7f0000000080)='./bus\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}}) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 445.876038] R13: 00000000004c7979 R14: 00000000004dd398 R15: 0000000000000005 [ 445.883513] protocol 88fb is buggy, dev hsr_slave_0 [ 445.888607] protocol 88fb is buggy, dev hsr_slave_1 [ 445.947991] 9pnet: p9_fd_create_tcp (32167): problem connecting socket to -27.0.0.1 [ 445.947991] ommit_pending_bools 19:57:27 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) [ 446.051695] 9pnet: p9_fd_create_tcp (32167): problem connecting socket to -27.0.0.1 [ 446.051695] ommit_pending_bools 19:57:28 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:28 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0c6c6469723d2e3a66696cff90e0e2f0f85ac97a59bb0e4a3f649ecd4600fe02dbd7dbe530"]) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000280)=""/121, 0x200002f9) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) readv(r4, &(0x7f0000000840)=[{&(0x7f0000000880)=""/11, 0xb}, {&(0x7f0000000740)=""/203, 0xcb}], 0xf3) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r6 = syz_open_procfs(0x0, &(0x7f00000005c0)='net/mcfilter6\x00') readv(r6, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r7 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r7, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) 19:57:28 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) [ 446.128088] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.2'. 19:57:28 executing program 2 (fault-call:3 fault-nth:3): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:28 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x0, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:28 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) [ 446.455221] FAULT_INJECTION: forcing a failure. [ 446.455221] name failslab, interval 1, probability 0, space 0, times 0 [ 446.466857] CPU: 1 PID: 32208 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 446.473805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.483176] Call Trace: [ 446.485789] dump_stack+0x172/0x1f0 [ 446.489448] should_fail.cold+0xa/0x1b [ 446.493360] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 446.498487] ? __kernel_text_address+0xd/0x40 [ 446.503010] ? unwind_get_return_address+0x61/0xa0 [ 446.508066] __should_failslab+0x121/0x190 [ 446.512330] should_failslab+0x9/0x14 [ 446.516158] kmem_cache_alloc+0x47/0x700 [ 446.520262] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.525822] ? check_preemption_disabled+0x48/0x290 [ 446.530862] ? lock_acquire+0x16f/0x3f0 [ 446.534866] skb_clone+0x156/0x3e0 [ 446.538427] dev_queue_xmit_nit+0x309/0xa10 [ 446.542767] ? validate_xmit_xfrm+0x1f7/0xda0 [ 446.547376] dev_hard_start_xmit+0xa7/0x980 [ 446.551719] ? check_preemption_disabled+0x48/0x290 [ 446.556766] __dev_queue_xmit+0x2704/0x2fe0 [ 446.560012] protocol 88fb is buggy, dev hsr_slave_0 [ 446.561127] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.561152] ? netdev_pick_tx+0x300/0x300 [ 446.566214] protocol 88fb is buggy, dev hsr_slave_1 [ 446.571689] ? __copy_skb_header+0x260/0x560 [ 446.571704] ? skb_checksum+0xc0/0xc0 [ 446.571720] ? rcu_read_lock_sched_held+0x110/0x130 [ 446.571738] ? kasan_check_write+0x14/0x20 [ 446.571752] ? __skb_clone+0x613/0x870 [ 446.602228] dev_queue_xmit+0x18/0x20 [ 446.606046] ? dev_queue_xmit+0x18/0x20 [ 446.610038] netlink_deliver_tap+0x910/0xc20 [ 446.614472] netlink_unicast+0x5a8/0x720 [ 446.618557] ? netlink_attachskb+0x770/0x770 [ 446.622996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.628557] netlink_sendmsg+0x8ae/0xd70 [ 446.632647] ? netlink_unicast+0x720/0x720 [ 446.636895] ? selinux_socket_sendmsg+0x36/0x40 [ 446.641590] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.647146] ? security_socket_sendmsg+0x8d/0xc0 [ 446.651926] ? netlink_unicast+0x720/0x720 [ 446.656181] sock_sendmsg+0xd7/0x130 [ 446.659915] ___sys_sendmsg+0x803/0x920 [ 446.663944] ? copy_msghdr_from_user+0x430/0x430 [ 446.669083] ? lock_downgrade+0x810/0x810 [ 446.673258] ? kasan_check_read+0x11/0x20 [ 446.677422] ? __fget+0x367/0x540 [ 446.677442] ? iterate_fd+0x360/0x360 [ 446.677464] ? __fget_light+0x1a9/0x230 [ 446.684702] ? __fdget+0x1b/0x20 [ 446.684720] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 446.684744] __sys_sendmsg+0x105/0x1d0 [ 446.701501] ? __ia32_sys_shutdown+0x80/0x80 [ 446.705962] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 446.710741] ? do_syscall_64+0x26/0x620 [ 446.714736] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 446.720151] ? do_syscall_64+0x26/0x620 [ 446.724251] __x64_sys_sendmsg+0x78/0xb0 [ 446.728367] do_syscall_64+0xfd/0x620 [ 446.732193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 446.737402] RIP: 0033:0x459a29 19:57:28 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:28 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:28 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x0, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:28 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) [ 446.740622] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 446.759677] RSP: 002b:00007f7e14a8cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 446.767678] RAX: ffffffffffffffda RBX: 00007f7e14a8cc90 RCX: 0000000000459a29 [ 446.775072] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 446.782363] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 446.789658] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7e14a8d6d4 [ 446.797028] R13: 00000000004c7979 R14: 00000000004dd398 R15: 0000000000000005 19:57:28 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:28 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) [ 446.917135] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.2'. 19:57:28 executing program 2 (fault-call:3 fault-nth:4): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) [ 447.094705] overlayfs: unrecognized mount option " ldir=.:filÿàâðøZÉzY»J?džÍF" or missing value [ 447.111593] FAULT_INJECTION: forcing a failure. [ 447.111593] name failslab, interval 1, probability 0, space 0, times 0 [ 447.122983] protocol 88fb is buggy, dev hsr_slave_0 [ 447.123044] protocol 88fb is buggy, dev hsr_slave_1 [ 447.147144] CPU: 1 PID: 32319 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 447.154122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.163599] Call Trace: [ 447.166324] dump_stack+0x172/0x1f0 [ 447.169964] should_fail.cold+0xa/0x1b [ 447.173857] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 447.178958] ? lock_downgrade+0x810/0x810 [ 447.183120] __should_failslab+0x121/0x190 [ 447.187367] should_failslab+0x9/0x14 [ 447.191181] kmem_cache_alloc_trace+0x2cc/0x760 [ 447.195854] ? lockdep_rtnl_is_held+0x26/0x30 [ 447.200356] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.205910] tc_new_tfilter+0x93c/0x1790 [ 447.209998] ? tc_del_tfilter+0xe60/0xe60 [ 447.214166] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 447.218577] ? kfree_skbmem+0xcb/0x150 [ 447.222469] ? mutex_trylock+0x1e0/0x1e0 [ 447.226543] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 447.232077] ? tc_del_tfilter+0xe60/0xe60 [ 447.236215] rtnetlink_rcv_msg+0x463/0xb00 [ 447.240460] ? rtnetlink_put_metrics+0x560/0x560 [ 447.245218] ? netdev_pick_tx+0x300/0x300 [ 447.249376] ? netlink_deliver_tap+0x22d/0xc20 [ 447.254403] ? find_held_lock+0x35/0x130 [ 447.258485] netlink_rcv_skb+0x17d/0x460 [ 447.262559] ? rtnetlink_put_metrics+0x560/0x560 [ 447.267332] ? netlink_ack+0xb30/0xb30 [ 447.271352] ? kasan_check_read+0x11/0x20 [ 447.275506] ? netlink_deliver_tap+0x254/0xc20 [ 447.280365] rtnetlink_rcv+0x1d/0x30 [ 447.284083] netlink_unicast+0x537/0x720 [ 447.288162] ? netlink_attachskb+0x770/0x770 [ 447.292583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.298114] netlink_sendmsg+0x8ae/0xd70 [ 447.302185] ? netlink_unicast+0x720/0x720 [ 447.306441] ? selinux_socket_sendmsg+0x36/0x40 [ 447.311126] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.316677] ? security_socket_sendmsg+0x8d/0xc0 [ 447.321450] ? netlink_unicast+0x720/0x720 [ 447.325702] sock_sendmsg+0xd7/0x130 [ 447.329443] ___sys_sendmsg+0x803/0x920 [ 447.333413] ? copy_msghdr_from_user+0x430/0x430 [ 447.338169] ? lock_downgrade+0x810/0x810 [ 447.342323] ? kasan_check_read+0x11/0x20 [ 447.346498] ? __fget+0x367/0x540 [ 447.349973] ? iterate_fd+0x360/0x360 [ 447.353804] ? __fget_light+0x1a9/0x230 [ 447.357772] ? __fdget+0x1b/0x20 [ 447.361136] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 447.366677] __sys_sendmsg+0x105/0x1d0 [ 447.370571] ? __ia32_sys_shutdown+0x80/0x80 [ 447.374991] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 447.379737] ? do_syscall_64+0x26/0x620 [ 447.383740] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 447.389105] ? do_syscall_64+0x26/0x620 [ 447.393091] __x64_sys_sendmsg+0x78/0xb0 [ 447.397151] do_syscall_64+0xfd/0x620 [ 447.400970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 447.406160] RIP: 0033:0x459a29 [ 447.409359] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 447.428316] RSP: 002b:00007f7e14a8cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 447.436035] RAX: ffffffffffffffda RBX: 00007f7e14a8cc90 RCX: 0000000000459a29 19:57:29 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)=ANY=[@ANYBLOB="656e633d706b63733120686173023d736861312d7373735533000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000180000000000"], &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 447.443311] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 447.450594] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 447.457870] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7e14a8d6d4 [ 447.465400] R13: 00000000004c7979 R14: 00000000004dd398 R15: 0000000000000005 19:57:29 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:29 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0x0, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:29 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:29 executing program 2 (fault-call:3 fault-nth:5): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:29 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:29 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0x0, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:29 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', 0x0, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 447.765187] FAULT_INJECTION: forcing a failure. [ 447.765187] name failslab, interval 1, probability 0, space 0, times 0 [ 447.868084] CPU: 1 PID: 32441 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 447.875070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.884443] Call Trace: [ 447.887051] dump_stack+0x172/0x1f0 [ 447.890703] should_fail.cold+0xa/0x1b [ 447.894616] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 447.899740] ? lock_downgrade+0x810/0x810 [ 447.904097] __should_failslab+0x121/0x190 [ 447.908438] should_failslab+0x9/0x14 [ 447.912256] kmem_cache_alloc_trace+0x2cc/0x760 [ 447.916944] ? kasan_check_write+0x14/0x20 [ 447.921197] ? do_raw_read_unlock+0x3f/0x70 [ 447.925557] route4_init+0x40/0xa0 [ 447.929113] tc_new_tfilter+0xaf1/0x1790 [ 447.933202] ? tc_del_tfilter+0xe60/0xe60 [ 447.937375] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 447.941798] ? kfree_skbmem+0xcb/0x150 [ 447.945700] ? mutex_trylock+0x1e0/0x1e0 [ 447.949794] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 447.955378] ? tc_del_tfilter+0xe60/0xe60 [ 447.959542] rtnetlink_rcv_msg+0x463/0xb00 [ 447.963794] ? rtnetlink_put_metrics+0x560/0x560 [ 447.968565] ? netdev_pick_tx+0x300/0x300 [ 447.972734] ? netlink_deliver_tap+0x22d/0xc20 [ 447.977338] ? find_held_lock+0x35/0x130 [ 447.981425] netlink_rcv_skb+0x17d/0x460 [ 447.985506] ? rtnetlink_put_metrics+0x560/0x560 [ 447.990294] ? netlink_ack+0xb30/0xb30 [ 447.994220] ? kasan_check_read+0x11/0x20 [ 447.998392] ? netlink_deliver_tap+0x254/0xc20 [ 448.002998] rtnetlink_rcv+0x1d/0x30 [ 448.006732] netlink_unicast+0x537/0x720 [ 448.010821] ? netlink_attachskb+0x770/0x770 [ 448.015271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 448.020833] netlink_sendmsg+0x8ae/0xd70 [ 448.025011] ? netlink_unicast+0x720/0x720 [ 448.029265] ? selinux_socket_sendmsg+0x36/0x40 [ 448.033952] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 448.039512] ? security_socket_sendmsg+0x8d/0xc0 [ 448.044287] ? netlink_unicast+0x720/0x720 [ 448.048542] sock_sendmsg+0xd7/0x130 [ 448.052274] ___sys_sendmsg+0x803/0x920 [ 448.056268] ? copy_msghdr_from_user+0x430/0x430 [ 448.061051] ? lock_downgrade+0x810/0x810 [ 448.065214] ? kasan_check_read+0x11/0x20 [ 448.069380] ? __fget+0x367/0x540 [ 448.072850] ? iterate_fd+0x360/0x360 [ 448.076672] ? __fget_light+0x1a9/0x230 [ 448.080677] ? __fdget+0x1b/0x20 [ 448.084053] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 448.089610] __sys_sendmsg+0x105/0x1d0 [ 448.093513] ? __ia32_sys_shutdown+0x80/0x80 [ 448.097952] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 448.102726] ? do_syscall_64+0x26/0x620 [ 448.106719] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 448.112097] ? do_syscall_64+0x26/0x620 [ 448.116096] __x64_sys_sendmsg+0x78/0xb0 [ 448.120179] do_syscall_64+0xfd/0x620 [ 448.124112] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 448.129311] RIP: 0033:0x459a29 [ 448.132527] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 448.151450] RSP: 002b:00007f7e14a8cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 448.159187] RAX: ffffffffffffffda RBX: 00007f7e14a8cc90 RCX: 0000000000459a29 [ 448.166478] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 448.173775] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 448.181071] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7e14a8d6d4 [ 448.188522] R13: 00000000004c7979 R14: 00000000004dd398 R15: 0000000000000005 [ 448.196052] protocol 88fb is buggy, dev hsr_slave_0 [ 448.201192] protocol 88fb is buggy, dev hsr_slave_1 19:57:30 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0x0, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:30 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r4, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:30 executing program 2 (fault-call:3 fault-nth:6): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:30 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)=ANY=[@ANYBLOB='enc=pkcs1 hash=sha1-ssse3\x00'/71], &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x2000, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:30 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) [ 448.558271] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.2'. [ 448.579046] FAULT_INJECTION: forcing a failure. [ 448.579046] name failslab, interval 1, probability 0, space 0, times 0 [ 448.598801] CPU: 1 PID: 32561 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 448.605784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.615179] Call Trace: [ 448.617790] dump_stack+0x172/0x1f0 [ 448.621446] should_fail.cold+0xa/0x1b [ 448.625369] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 448.630490] ? lock_downgrade+0x810/0x810 [ 448.634671] __should_failslab+0x121/0x190 [ 448.638937] should_failslab+0x9/0x14 [ 448.642773] kmem_cache_alloc_trace+0x2cc/0x760 [ 448.647465] ? nla_parse+0x1fc/0x2f0 [ 448.651349] route4_change+0x29e/0x213e [ 448.655360] ? route4_init+0xa0/0xa0 [ 448.659111] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 448.664675] ? route4_init+0xa0/0xa0 [ 448.668413] tc_new_tfilter+0xc54/0x1790 [ 448.672510] ? tc_del_tfilter+0xe60/0xe60 [ 448.676685] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 448.681152] ? __lock_acquire+0x6ee/0x49c0 [ 448.685409] ? mutex_trylock+0x1e0/0x1e0 [ 448.689516] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 448.695081] ? tc_del_tfilter+0xe60/0xe60 [ 448.699252] rtnetlink_rcv_msg+0x463/0xb00 [ 448.703513] ? rtnetlink_put_metrics+0x560/0x560 [ 448.708320] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 448.713444] ? rcu_read_unlock_special+0x679/0xea0 [ 448.718401] ? netlink_deliver_tap+0x22d/0xc20 [ 448.723006] ? find_held_lock+0x35/0x130 [ 448.727529] netlink_rcv_skb+0x17d/0x460 [ 448.731614] ? rtnetlink_put_metrics+0x560/0x560 [ 448.736402] ? netlink_ack+0xb30/0xb30 [ 448.740320] ? netlink_deliver_tap+0x254/0xc20 [ 448.745099] rtnetlink_rcv+0x1d/0x30 [ 448.748834] netlink_unicast+0x537/0x720 [ 448.752926] ? netlink_attachskb+0x770/0x770 [ 448.757360] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 448.763011] netlink_sendmsg+0x8ae/0xd70 [ 448.767100] ? netlink_unicast+0x720/0x720 [ 448.771371] ? selinux_socket_sendmsg+0x36/0x40 [ 448.776060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 448.781621] ? security_socket_sendmsg+0x8d/0xc0 [ 448.786400] ? netlink_unicast+0x720/0x720 [ 448.790658] sock_sendmsg+0xd7/0x130 [ 448.794388] ___sys_sendmsg+0x803/0x920 [ 448.798383] ? copy_msghdr_from_user+0x430/0x430 [ 448.803171] ? lock_downgrade+0x810/0x810 [ 448.807348] ? kasan_check_read+0x11/0x20 [ 448.811530] ? __fget+0x367/0x540 [ 448.815021] ? iterate_fd+0x360/0x360 [ 448.818851] ? __fget_light+0x1a9/0x230 [ 448.822850] ? __fdget+0x1b/0x20 [ 448.826233] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 448.831801] __sys_sendmsg+0x105/0x1d0 [ 448.835717] ? __ia32_sys_shutdown+0x80/0x80 [ 448.840168] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 448.844953] ? do_syscall_64+0x26/0x620 [ 448.848957] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 448.854394] ? do_syscall_64+0x26/0x620 [ 448.858667] __x64_sys_sendmsg+0x78/0xb0 [ 448.862762] do_syscall_64+0xfd/0x620 [ 448.866591] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 448.872057] RIP: 0033:0x459a29 [ 448.875268] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 448.894187] RSP: 002b:00007f7e14a8cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 448.901924] RAX: ffffffffffffffda RBX: 00007f7e14a8cc90 RCX: 0000000000459a29 19:57:30 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r4, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:30 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r4, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) [ 448.909210] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 448.916506] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 448.923798] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7e14a8d6d4 [ 448.931086] R13: 00000000004c7979 R14: 00000000004dd398 R15: 0000000000000005 19:57:31 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:31 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) readv(r3, 0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(0x0, &(0x7f00000034c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2"}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r4, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:31 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', 0x0, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:31 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) 19:57:31 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xf9, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x627, 0xc1ed}, 0x3a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:31 executing program 2 (fault-call:3 fault-nth:7): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newtfilter={0x84, 0x2c, 0x701, 0x0, 0x0, {0x0, r1, {0xfff6}, {}, {0x1}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x54}}]}, 0x84}}, 0x0) 19:57:31 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(&(0x7f0000003580)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f00000003c0)=0xc37, &(0x7f00000005c0)=0x4) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r5, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r6, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xe8, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d3", &(0x7f0000000440)=""/207) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendfile(r2, r1, 0x0, 0x72439a6b) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 19:57:31 executing program 1: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/comls\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000034c0)={'syz', 0x2}, &(0x7f0000003500)='/selinux/policy\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f00000035c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0xf2c2, @rand_addr="fc89c3660cbf6846292da29adaf549c2", 0x80000001}, 0x1c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r4, 0x2800000) prctl$PR_SVE_SET_VL(0x32, 0xb2c1) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$eventfd(r5, &(0x7f0000000540), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000c00)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xeb, 0xcf}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000280)="ba2abc129c3141d10ecba33bd30ea25860af0d98767b172614ee1a45907999f72be37cfb096eed89739cf2e707129e4ed07c99d6f02d8539001d33391b41bd64860b5432f1d6d0c80bdb1780a1af07492a616f6b962748b4f7b5f9824ea216814db272639cdfdab6080d7db7f8422e16644a8759c66f9f1105b1d235cdab8c08113d22af3d8960500cafd04b3e135273f6160b9269a91b88ac10697b9f3ecd184b882c28cfe4294c39d4c82f613223ddfda60dbd18c2f1ecb0bc24137ee94b4c00a1f67db7c0e060bc982060750864719ba15e6bf8c82b5004a6f2743f2610f4a5460f982d50f9d34a9afa", &(0x7f0000000440)=""/207) sendfile(r2, r1, 0x0, 0x72439a6b) [ 449.509074] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.2'. [ 449.552978] FAULT_INJECTION: forcing a failure. [ 449.552978] name failslab, interval 1, probability 0, space 0, times 0 [ 449.564546] CPU: 1 PID: 32588 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 449.571497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.580867] Call Trace: [ 449.583490] dump_stack+0x172/0x1f0 [ 449.587145] should_fail.cold+0xa/0x1b [ 449.591059] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 449.596181] ? lock_downgrade+0x810/0x810 [ 449.600359] __should_failslab+0x121/0x190 [ 449.604609] should_failslab+0x9/0x14 [ 449.608421] kmem_cache_alloc_trace+0x2cc/0x760 [ 449.613098] ? nla_parse+0x1fc/0x2f0 [ 449.616827] route4_change+0x37b/0x213e [ 449.620830] ? route4_init+0xa0/0xa0 [ 449.624575] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 449.630126] ? route4_init+0xa0/0xa0 [ 449.633876] tc_new_tfilter+0xc54/0x1790 [ 449.637983] ? tc_del_tfilter+0xe60/0xe60 [ 449.642159] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 449.646584] ? kfree_skbmem+0xcb/0x150 [ 449.650518] ? mutex_trylock+0x1e0/0x1e0 [ 449.654616] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 449.660181] ? tc_del_tfilter+0xe60/0xe60 [ 449.664347] rtnetlink_rcv_msg+0x463/0xb00 [ 449.668602] ? rtnetlink_put_metrics+0x560/0x560 [ 449.673374] ? netdev_pick_tx+0x300/0x300 [ 449.677540] ? netlink_deliver_tap+0x22d/0xc20 [ 449.682147] ? find_held_lock+0x35/0x130 [ 449.686237] netlink_rcv_skb+0x17d/0x460 [ 449.690318] ? rtnetlink_put_metrics+0x560/0x560 [ 449.695090] ? netlink_ack+0xb30/0xb30 [ 449.698997] ? kasan_check_read+0x11/0x20 [ 449.703169] ? netlink_deliver_tap+0x254/0xc20 [ 449.707774] rtnetlink_rcv+0x1d/0x30 [ 449.711506] netlink_unicast+0x537/0x720 [ 449.715591] ? netlink_attachskb+0x770/0x770 [ 449.720016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 449.725570] netlink_sendmsg+0x8ae/0xd70 [ 449.729653] ? netlink_unicast+0x720/0x720 [ 449.733919] ? selinux_socket_sendmsg+0x36/0x40 [ 449.738603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 449.744599] ? security_socket_sendmsg+0x8d/0xc0 [ 449.749381] ? netlink_unicast+0x720/0x720 [ 449.753640] sock_sendmsg+0xd7/0x130 [ 449.757369] ___sys_sendmsg+0x803/0x920 [ 449.761359] ? copy_msghdr_from_user+0x430/0x430 [ 449.766157] ? lock_downgrade+0x810/0x810 [ 449.770333] ? kasan_check_read+0x11/0x20 [ 449.774499] ? __fget+0x367/0x540 [ 449.777969] ? iterate_fd+0x360/0x360 [ 449.781793] ? __fget_light+0x1a9/0x230 [ 449.785793] ? __fdget+0x1b/0x20 [ 449.789175] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 449.794745] __sys_sendmsg+0x105/0x1d0 [ 449.798649] ? __ia32_sys_shutdown+0x80/0x80 [ 449.803103] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 449.807890] ? do_syscall_64+0x26/0x620 [ 449.811901] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 449.817277] ? do_syscall_64+0x26/0x620 [ 449.821265] __x64_sys_sendmsg+0x78/0xb0 [ 449.825330] do_syscall_64+0xfd/0x620 [ 449.829143] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 449.834375] RIP: 0033:0x459a29 [ 449.837568] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 449.856464] RSP: 002b:00007f7e14a8cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 449.864182] RAX: ffffffffffffffda RBX: 00007f7e14a8cc90 RCX: 0000000000459a29 [ 449.871642] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 449.879005] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 449.886300] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7e14a8d6d4 [ 449.893575] R13: 00000000004c7979 R14: 00000000004dd398 R15: 0000000000000005 [ 449.902411] kasan: CONFIG_KASAN_INLINE enabled [ 449.907093] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 449.914591] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 449.920836] CPU: 1 PID: 32588 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 449.927761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.937130] RIP: 0010:tcf_action_destroy+0x71/0x160 [ 449.942571] Code: c3 08 44 89 ee e8 2f ae ea fb 41 83 fd 20 0f 84 c9 00 00 00 e8 a0 ac ea fb 48 89 d8 48 b9 00 00 00 00 00 fc ff df 48 c1 e8 03 <80> 3c 08 00 0f 85 c0 00 00 00 4c 8b 33 4d 85 f6 0f 84 9d 00 00 00 [ 449.961921] RSP: 0018:ffff888049467368 EFLAGS: 00010246 [ 449.967279] RAX: 0000000000000000 RBX: 0000000000000000 RCX: dffffc0000000000 [ 449.974825] RDX: 0000000000040000 RSI: ffffffff8580b5e0 RDI: 0000000000000000 [ 449.982090] RBP: ffff888049467398 R08: ffff88804fa823c0 R09: ffffed1015d24733 [ 449.989352] R10: ffffed1015d24732 R11: ffff8880ae923993 R12: 0000000000000000 [ 449.996620] R13: 0000000000000000 R14: ffff888049467658 R15: 0000000000000001 [ 450.003912] FS: 00007f7e14a8d700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 450.012142] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 450.018030] CR2: 0000001b32421000 CR3: 00000000a0cc7000 CR4: 00000000001406e0 [ 450.025302] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 450.032570] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 450.039825] Call Trace: [ 450.042560] tcf_exts_destroy+0x38/0xb0 [ 450.046709] route4_change+0xe72/0x213e [ 450.050699] ? route4_init+0xa0/0xa0 [ 450.054423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 450.059961] ? route4_init+0xa0/0xa0 [ 450.063690] tc_new_tfilter+0xc54/0x1790 [ 450.067765] ? tc_del_tfilter+0xe60/0xe60 [ 450.072253] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 450.076665] ? kfree_skbmem+0xcb/0x150 [ 450.080550] ? mutex_trylock+0x1e0/0x1e0 [ 450.084616] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 450.090158] ? tc_del_tfilter+0xe60/0xe60 [ 450.094301] rtnetlink_rcv_msg+0x463/0xb00 [ 450.098538] ? rtnetlink_put_metrics+0x560/0x560 [ 450.103381] ? netdev_pick_tx+0x300/0x300 [ 450.107528] ? netlink_deliver_tap+0x22d/0xc20 [ 450.112101] ? find_held_lock+0x35/0x130 [ 450.116160] netlink_rcv_skb+0x17d/0x460 [ 450.120221] ? rtnetlink_put_metrics+0x560/0x560 [ 450.124975] ? netlink_ack+0xb30/0xb30 [ 450.128936] ? kasan_check_read+0x11/0x20 [ 450.133073] ? netlink_deliver_tap+0x254/0xc20 [ 450.137644] rtnetlink_rcv+0x1d/0x30 [ 450.141355] netlink_unicast+0x537/0x720 [ 450.145428] ? netlink_attachskb+0x770/0x770 [ 450.149850] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 450.155380] netlink_sendmsg+0x8ae/0xd70 [ 450.159430] ? netlink_unicast+0x720/0x720 [ 450.163661] ? selinux_socket_sendmsg+0x36/0x40 [ 450.168318] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 450.173848] ? security_socket_sendmsg+0x8d/0xc0 [ 450.178601] ? netlink_unicast+0x720/0x720 [ 450.182844] sock_sendmsg+0xd7/0x130 [ 450.186557] ___sys_sendmsg+0x803/0x920 [ 450.190550] ? copy_msghdr_from_user+0x430/0x430 [ 450.195802] ? lock_downgrade+0x810/0x810 [ 450.200099] ? kasan_check_read+0x11/0x20 [ 450.204262] ? __fget+0x367/0x540 [ 450.207706] ? iterate_fd+0x360/0x360 [ 450.211503] ? __fget_light+0x1a9/0x230 [ 450.215615] ? __fdget+0x1b/0x20 [ 450.218975] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 450.224507] __sys_sendmsg+0x105/0x1d0 [ 450.228667] ? __ia32_sys_shutdown+0x80/0x80 [ 450.233080] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 450.237839] ? do_syscall_64+0x26/0x620 [ 450.241811] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 450.247167] ? do_syscall_64+0x26/0x620 [ 450.251164] __x64_sys_sendmsg+0x78/0xb0 [ 450.255226] do_syscall_64+0xfd/0x620 [ 450.259020] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 450.264202] RIP: 0033:0x459a29 [ 450.267386] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 450.286282] RSP: 002b:00007f7e14a8cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 450.293987] RAX: ffffffffffffffda RBX: 00007f7e14a8cc90 RCX: 0000000000459a29 [ 450.301785] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 450.309046] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 450.316578] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7e14a8d6d4 [ 450.326730] R13: 00000000004c7979 R14: 00000000004dd398 R15: 0000000000000005 [ 450.334014] Modules linked in: [ 450.343178] ---[ end trace b36c2df4c7fec5d6 ]--- [ 450.348004] RIP: 0010:tcf_action_destroy+0x71/0x160 [ 450.353087] Code: c3 08 44 89 ee e8 2f ae ea fb 41 83 fd 20 0f 84 c9 00 00 00 e8 a0 ac ea fb 48 89 d8 48 b9 00 00 00 00 00 fc ff df 48 c1 e8 03 <80> 3c 08 00 0f 85 c0 00 00 00 4c 8b 33 4d 85 f6 0f 84 9d 00 00 00 [ 450.372306] RSP: 0018:ffff888049467368 EFLAGS: 00010246 [ 450.377717] RAX: 0000000000000000 RBX: 0000000000000000 RCX: dffffc0000000000 [ 450.385313] RDX: 0000000000040000 RSI: ffffffff8580b5e0 RDI: 0000000000000000 [ 450.392654] RBP: ffff888049467398 R08: ffff88804fa823c0 R09: ffffed1015d24733 [ 450.399989] R10: ffffed1015d24732 R11: ffff8880ae923993 R12: 0000000000000000 [ 450.407329] R13: 0000000000000000 R14: ffff888049467658 R15: 0000000000000001 [ 450.414705] FS: 00007f7e14a8d700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 450.423909] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 450.430008] CR2: 0000001b31d22000 CR3: 00000000a0cc7000 CR4: 00000000001406e0 [ 450.437449] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 450.444853] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 450.452303] Kernel panic - not syncing: Fatal exception [ 450.459493] Kernel Offset: disabled [ 450.463134] Rebooting in 86400 seconds..