000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:10 executing program 2:

03:34:10 executing program 1:

03:34:10 executing program 5:

03:34:10 executing program 3:

03:34:10 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, 0x0, &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2])

03:34:10 executing program 2:

03:34:10 executing program 5:

03:34:10 executing program 3:
mkdir(&(0x7f0000000580)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00')
lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000680), 0x24, 0x0)

03:34:10 executing program 1:
faccessat(0xffffffffffffffff, &(0x7f0000000000)='/', 0x5, 0x200)

03:34:10 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, 0x0, &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2])

03:34:10 executing program 2:
r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcff47bf070")
ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000080)={0x0, 0x1c9c380}, 0x0, 0x0)

[  249.927986] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  249.991987] SELinux: failed to load policy
03:34:10 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640"], 0x18)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:10 executing program 1:
r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcff47bf070")
ppoll(&(0x7f0000000040)=[{r0}, {r1}, {}], 0x3, &(0x7f0000000080), 0x0, 0x0)

03:34:10 executing program 5:
r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0)
write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca)
r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
pipe(0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0)
shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0x4000)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@empty, @in6=@dev}}, {{@in6=@initdev}, 0x0, @in6=@dev}}, 0xffffffffffffffff)
ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}})
bind(0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@initdev, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0)
ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0)

03:34:10 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2])

03:34:10 executing program 3:
openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40, 0x0)
getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0)
getpid()
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = creat(&(0x7f0000000500)='./bus\x00', 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
flock(0xffffffffffffffff, 0x0)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0)
getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, 0x0, &(0x7f0000000400))
io_setup(0x4, &(0x7f00000004c0)=<r2=>0x0)
io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}])
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0)
io_submit(0x0, 0x1, &(0x7f0000000900)=[0x0])
write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0)=0x5, 0x12)
write$cgroup_int(r3, &(0x7f0000000140), 0xffffff35)
setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000280)={0x0, 0x6}, 0x8)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4002)
ftruncate(0xffffffffffffffff, 0x0)

03:34:10 executing program 2:
r0 = gettid()
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040))
timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0)
r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0)
read(r1, &(0x7f00000003c0)=""/11, 0xb)
r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00D\xde\x9b\x02\x16\a')
r3 = openat$cgroup_ro(r2, &(0x7f0000000200)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x03\x00\x00\x00\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5\xfe\x13\x15\x14\xd7\xb8\xed\xf20\x1e\xc0\xc2\xedz?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7J\xbdX?\xc4\xf4BV\x1744`\xd1@\xb6T\xa6\x81\xb0\xfa\xc4RW\x01\x1f%\xd8\x01\xd0W\xc8\xb09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#\xf7a\xff\xff\xff\xff\xff\xff\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x00\x00\x0e\xa9\x04G*\xd4]\xc3\xcdp\xca+x\x93\xc0g.l\t\r\x1bE\xf3Y\xf0G4\xde\x970]\xa2\xf0\xc4\xb7\x19\xc5xe\xb5\xe2\v\xff\xf8i5I\x89\x9b\xcdZ\xb4\xcd\xa5|\xe2\xca\x88\xf8|\x99\xd09\xb4zc\x90g\xd8\xf1\x05\xefH\xb2\xf8ph\x04\xfb\x9e\x84\x84\x80\x17r\x1a\x88\x8fI\x9c\n\xba\x8c\x9a\x98\xee\xcc\n\x9c\xc2\xea\t\x18\xc8\xfbr\x9e*\xdeE\x80\x10\xd7\xee.\x9c\xed\x81aY:\x95\xd7&\x99\xa5\x80\x05\xec+}mu\x12\x98^\xeb\xfb\x00t?@\x81\x16\xb9\"}\x92k\x81CR\x94\xccIW5\xe6\x98\x9e\xb1\x91\xfe\xbe\xec\x17\x0f\"\xb9(5\x8aZ^\x10({A\x94.\x00\x00\x00\xd3!\x83\x93T\x87n3q\vfPx2+\vd\xdc\xaf\xe0I\x95\x00\xd7\x14U26\x85\xaa\xb5|\x187\xc3f\b\xafg+\xc1%\xd9\xd60\a\f\xb8a\xbb\xf8\x00\xfaat\xb3\xdd\xf3\xd5\x91\x19\xaf+A\xfb', 0x0, 0x0)
lseek(r3, 0xfffffffffffff2d1, 0x0)
dup3(r3, r1, 0x0)
tkill(r0, 0x1000000000015)

03:34:10 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2])

03:34:10 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640"], 0x18)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  250.214067] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  250.237487] SELinux: failed to load policy
03:34:10 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setaffinity(0x0, 0x8, &(0x7f0000000540)=0x80005)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0)
ftruncate(r0, 0x8003f1)
openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000000)='tasks\x00', 0x2, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000)
r1 = open(&(0x7f0000000380)='./bus\x00', 0x0, 0x3)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0))
ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000007c0)={0x0, 0xffffffff})

03:34:10 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2])

03:34:11 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c4"], 0x1c)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:11 executing program 2:
r0 = creat(&(0x7f0000002440)='./file0\x00', 0x0)
r1 = creat(&(0x7f0000002440)='./file0\x00', 0x0)
fallocate(r1, 0x0, 0x0, 0x10001)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dcbc0d5e0bcfe47bf070")
fallocate(r0, 0x8, 0x0, 0x8000)

[  250.485916] audit: type=1804 audit(2000000051.040:16752): pid=13585 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir138443283/syzkaller.LtqYZd/378/bus" dev="sda1" ino=17099 res=1
03:34:11 executing program 4:
pipe2$9p(&(0x7f0000000240), 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
dup(r0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, 0x0)

[  250.563532] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  250.631789] SELinux: failed to load policy
03:34:11 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c4"], 0x1c)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  250.879709] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  250.937653] SELinux: failed to load policy
03:34:11 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:34:11 executing program 2:
openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40, 0x0)
getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0)
getpid()
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = creat(&(0x7f0000000500)='./bus\x00', 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
flock(0xffffffffffffffff, 0x0)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0)
getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, 0x0, &(0x7f0000000400))
io_setup(0x4, &(0x7f00000004c0)=<r3=>0x0)
io_submit(r3, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}])
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0)
io_submit(0x0, 0x1, &(0x7f0000000900)=[0x0])
write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0)=0x5, 0x12)
write$cgroup_int(r4, &(0x7f0000000140), 0xffffff35)
setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000280)={0x0, 0x6}, 0x8)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4002)
ftruncate(0xffffffffffffffff, 0x0)

03:34:11 executing program 4:
pipe2$9p(&(0x7f0000000240), 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
dup(r0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, 0x0)

03:34:11 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c4"], 0x1c)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:11 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x11000008912, &(0x7f0000000000)="11dca50d6c0bcfe47bf070")
init_module(&(0x7f0000000100)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\r\x17`s\xec\x85>\xcf\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95!\xea\x11\xda\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|', 0x178, 0x0)

03:34:11 executing program 4:
pipe2$9p(&(0x7f0000000240), 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
dup(r0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, 0x0)

[  251.289244] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  251.312600] SELinux: failed to load policy
[  251.339140] audit: type=1804 audit(2000000051.890:16753): pid=13591 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir138443283/syzkaller.LtqYZd/378/bus" dev="sda1" ino=17099 res=1
03:34:12 executing program 1:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = creat(&(0x7f0000000500)='./bus\x00', 0x4)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0x4, &(0x7f00000004c0)=<r2=>0x0)
io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}])
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0)
write$cgroup_int(r3, &(0x7f0000000140), 0xffffff35)
creat(&(0x7f0000000040)='./bus\x00', 0x0)

03:34:12 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno='])

[  251.601984] 9pnet: Insufficient options for proto=fd
03:34:12 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno='])

[  251.634198] audit: type=1804 audit(2000000052.030:16754): pid=13634 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir138443283/syzkaller.LtqYZd/378/bus" dev="sda1" ino=17099 res=1
[  251.811664] 9pnet: Insufficient options for proto=fd
03:34:12 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f00"], 0x1e)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:12 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno='])

[  252.037506] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  252.048875] 9pnet: Insufficient options for proto=fd
03:34:12 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX])

[  252.078125] SELinux: failed to load policy
[  252.087148] audit: type=1400 audit(2000000052.650:16755): avc:  denied  { module_load } for  pid=13658 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=system permissive=1
[  252.200441] 9pnet: Insufficient options for proto=fd
03:34:13 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:34:13 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
msgrcv(0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0)
r1 = gettid()
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000))
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)
tkill(r1, 0x1000000000013)
msgsnd(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="03000000000000002711a4edd9fc40d31279273c28a98c45539ff9919287eedd3a9e90c5d37f36bdd5f492680a3a7109e353f12b391f21a04517ba74d79d596d86cf15054c44968d52b1e10f281294c96c8714ccc3d275ee8a49cb1f6ca5c9"], 0x0, 0x0)
msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9})

03:34:13 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f00"], 0x1e)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:13 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX])

03:34:13 executing program 2:
openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40, 0x0)
getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0)
getpid()
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = creat(&(0x7f0000000500)='./bus\x00', 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
flock(0xffffffffffffffff, 0x0)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0)
getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, 0x0, &(0x7f0000000400))
io_setup(0x4, &(0x7f00000004c0)=<r3=>0x0)
io_submit(r3, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}])
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0)
io_submit(0x0, 0x1, &(0x7f0000000900)=[0x0])
write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0)=0x5, 0x12)
write$cgroup_int(r4, &(0x7f0000000140), 0xffffff35)
setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000280)={0x0, 0x6}, 0x8)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4002)
ftruncate(0xffffffffffffffff, 0x0)

03:34:13 executing program 1:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = creat(&(0x7f0000000500)='./bus\x00', 0x4)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0x4, &(0x7f00000004c0)=<r2=>0x0)
io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}])
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0)
write$cgroup_int(r3, &(0x7f0000000140), 0xffffff35)
creat(&(0x7f0000000040)='./bus\x00', 0x0)

[  253.309321] 9pnet: Insufficient options for proto=fd
[  253.331779] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:34:13 executing program 3:
clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x40000000000006)
ptrace$cont(0x18, r0, 0x0, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x400, 0x1, 0x48})
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x1f, r0, 0x0, 0x0)

03:34:14 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX])

[  253.442349] SELinux: failed to load policy
03:34:14 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f00"], 0x1e)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  253.478819] ptrace attach of "/root/syz-executor.3"[13706] was attempted by "/root/syz-executor.3"[13707]
[  253.546422] 9pnet: Insufficient options for proto=fd
03:34:14 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c)
listen(r0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r1, 0x0, 0x0, 0x20040060, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c)

03:34:14 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYRESHEX=r2])

[  253.643953] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  253.669690] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
03:34:14 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f0006"], 0x1f)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  253.770941] 9pnet: Insufficient options for proto=fd
[  253.787624] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
[  253.976156] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  254.026835] sel_write_load: 1 callbacks suppressed
[  254.026861] SELinux: failed to load policy
03:34:25 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:34:25 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYRESHEX=r2])

03:34:25 executing program 3:
r0 = socket$inet6(0xa, 0x80003, 0x7)
connect$inet6(r0, &(0x7f0000000040), 0x1c)
sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0)
recvmmsg(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2, 0x0)

03:34:25 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f0006"], 0x1f)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:25 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xa4, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x40b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@IFLA_IPTUN_PROTO={0x8, 0xf, 0xc101}]}}}]}, 0x3c}}, 0x0)

03:34:25 executing program 1:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = creat(&(0x7f0000000500)='./bus\x00', 0x4)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0x4, &(0x7f00000004c0)=<r2=>0x0)
io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}])
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0)
write$cgroup_int(r3, &(0x7f0000000140), 0xffffff35)
creat(&(0x7f0000000040)='./bus\x00', 0x0)

[  264.826013] 9pnet: Insufficient options for proto=fd
03:34:25 executing program 2:
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\r\x17`s\xec\x85>\xcf\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95!\xea\x11\xda\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|', 0x2761, 0x0)
write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0)
write$P9_RWSTAT(r0, 0x0, 0x0)
r1 = getpid()
ptrace$setregset(0x4205, r1, 0x3, &(0x7f00000001c0)={&(0x7f0000000180)="a8c2ebdb3b4a34c5e11b88562af9d683d58674f7d0fd7db6ee81c1601f916c72a46ebe48bddeeb2a65ecd0521e6b", 0x2e})
r2 = gettid()
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(r2, 0x38)
ptrace$cont(0x18, r2, 0x0, 0x0)
ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080))
ptrace$cont(0x1f, r2, 0x0, 0x0)
ptrace$cont(0x9, r1, 0x1, 0x10001)
ptrace(0x4207, r2)
syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00')
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = geteuid()
setreuid(r4, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000440)=0xe8)
r6 = socket$inet6(0xa, 0x2, 0x0)
sendmsg$inet6(r6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@tclass={{0x14, 0x29, 0x3b, 0x2}}], 0x18}, 0x40008090)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000480)={0x0, <r7=>0x0}, &(0x7f00000004c0)=0xc)
stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000a40))
stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0})
r9 = getgid()
setgid(0x0)
fstat(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
lstat(&(0x7f0000000400)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, <r11=>0x0})
setgid(r11)
getgroups(0x6, &(0x7f0000000780)=[r11, <r12=>0x0, 0xffffffffffffffff, 0xee01, 0xee00, 0xee01])
fsetxattr$system_posix_acl(r3, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000010004000000000002000400", @ANYRES32=r4, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=r5, @ANYBLOB="02000100", @ANYRES32=r7, @ANYBLOB="040002000000000008000400", @ANYBLOB='\b\x00qK', @ANYRES32=r8, @ANYBLOB="08000600", @ANYRES32=r9, @ANYRES32, @ANYBLOB='\b\x00\v\x00', @ANYRES32, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r10, @ANYBLOB="080001", @ANYRES32=r12, @ANYBLOB="10000400000000002000020000000000"], 0x15, 0x3)
sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x5}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000010)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc0010000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1b, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4c880}, 0x4000000)
getpriority(0x2, 0x0)

03:34:25 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYRESHEX=r2])

[  264.854560] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:34:25 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f0006"], 0x1f)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  264.931429] SELinux: failed to load policy
[  265.006791] 9pnet: Insufficient options for proto=fd
03:34:25 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESHEX=r2])

[  265.071005] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  265.137052] SELinux: failed to load policy
03:34:25 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000600)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xffffffff, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x8, 0x0, [], 0x7ff}, {0x0, 0x7, 0x0, [], 0xffffffff}]}})

[  265.165447] 9pnet: Insufficient options for proto=fd
03:34:25 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x0, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  265.342236] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  265.386400] SELinux: failed to load policy
03:34:26 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:34:26 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESHEX=r2])

03:34:26 executing program 3:
semop(0xffffffffffffffff, 0x0, 0x29)

03:34:26 executing program 2:
msgrcv(0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0)
r0 = gettid()
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000))
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)
tkill(r0, 0x1000000000013)
msgsnd(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="03000000000000002711a4edd9fc40d31279273c28a98c45539ff9919287eedd3a9e90c5d37f36bdd5f492680a3a7109e353f12b391f21a04517ba74d79d596d86cf15054c44968d52b1e10f281294c96c8714ccc3d275ee8a49cb1f6ca5c9"], 0x0, 0x0)

03:34:26 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x0, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:26 executing program 1:
openat(0xffffffffffffff9c, &(0x7f00000204c0)='./file1\x00', 0x10000, 0x140)

03:34:26 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
r1 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r1, &(0x7f0000000380)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5)\x00'}, 0x58)
socket$inet6(0xa, 0x802, 0x0)
setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00005b1ffc), 0x4)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
dup2(r0, r1)

03:34:26 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
getsockopt$sock_int(r0, 0x1, 0x27, &(0x7f0000000040), &(0x7f0000000080)=0x4)

03:34:26 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESHEX=r2])

[  265.687890] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  265.701847] 9pnet: Insufficient options for proto=fd
[  265.711229] SELinux: failed to load policy
03:34:26 executing program 1:
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00')
pread64(r0, &(0x7f0000e3e000)=""/8, 0x210, 0x103f00)

[  265.823232] 9pnet: Insufficient options for proto=fd
03:34:26 executing program 3:
open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1)
clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe)
execve(&(0x7f0000000440)='./file0\x00', 0x0, 0x0)

03:34:26 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000600)={0x2, 0x0, @ioapic={0x0, 0x3266, 0x0, 0xffffffff, 0x0, [{0x0, 0x6, 0xffff}, {0x0, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0xe7}, {0x0, 0xffffffff80000001}, {0x0, 0x0, 0x5}, {0x0, 0x6}, {}, {0x0, 0x0, 0x6}, {0x0, 0xfffffffffffffc10, 0x0, [], 0x8000}, {}, {0x0, 0x0, 0x0, [], 0x5}, {}, {0x400, 0x0, 0x0, [], 0x4}, {0x0, 0x6}, {}, {}, {0x6, 0x0, 0x0, [], 0x80000000000}, {0x20, 0x0, 0x0, [], 0x80000000}, {}, {0xfffffffffffffffe}, {}, {0x0, 0x8}, {0x4, 0x7}, {0x0, 0x5, 0x2}]}})
openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_open_dev$mice(0x0, 0x0, 0x0)

03:34:27 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
socket$inet_udp(0x2, 0x2, 0x0)

03:34:27 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfd', @ANYRESHEX=r2])

03:34:27 executing program 1:
r0 = socket$inet(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[{0x20, 0x0, 0x0, "95d72821c60b6f18d4"}], 0x20}}], 0x1, 0x0)
sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0)
recvmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffa7}}], 0x80004ec, 0x0, 0x0)

03:34:27 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x0, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:27 executing program 3:
r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcff47bf070")
ppoll(&(0x7f0000000040)=[{r0, 0x34f78b49ea9c5db5}, {0xffffffffffffffff, 0xc00}, {r1}], 0x3, 0x0, 0x0, 0x0)

03:34:27 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000600)={0x2, 0x0, @ioapic={0x0, 0x3266, 0x0, 0xffffffff, 0x0, [{0x0, 0x6, 0xffff}, {0x0, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0xe7}, {0x0, 0xffffffff80000001}, {0x0, 0x0, 0x5}, {0x0, 0x6}, {}, {0x0, 0x0, 0x6}, {0x0, 0xfffffffffffffc10, 0x0, [], 0x8000}, {}, {0x0, 0x0, 0x0, [], 0x5}, {}, {0x400, 0x0, 0x0, [], 0x4}, {0x0, 0x6}, {}, {}, {0x6, 0x0, 0x0, [], 0x80000000000}, {0x20, 0x0, 0x0, [], 0x80000000}, {}, {0xfffffffffffffffe}, {}, {0x0, 0x8}, {0x4, 0x7}, {0x0, 0x5, 0x2}]}})
openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_open_dev$mice(0x0, 0x0, 0x0)

[  266.508088] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'.
[  266.528453] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  266.545683] 9pnet: Insufficient options for proto=fd
03:34:27 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfd', @ANYRESHEX=r2])

[  266.555148] SELinux: failed to load policy
03:34:27 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pwrite64(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, &(0x7f0000000180))
ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000600)={0x2, 0x0, @ioapic={0xf000, 0x0, 0xa75d, 0xffffffff, 0x0, [{0xc6c1, 0x6, 0xffff}, {0x0, 0xda, 0x8}, {0x0, 0x0, 0x0, [], 0xe7}, {0x0, 0x0, 0x8, [], 0x100}, {0x8, 0x0, 0x0, [], 0x1a0}, {0x0, 0x6, 0x0, [], 0x5a6}, {}, {0x0, 0xffffffff}, {0x0, 0xfffffffffffffc10}, {}, {0x0, 0x0, 0x1, [], 0x5}, {0x0, 0x0, 0x0, [], 0x7}, {0x400, 0x0, 0x0, [], 0x4}, {0x0, 0x6}, {}, {0x0, 0x7, 0x4, [], 0x9}, {0x6, 0x22c, 0x6, [], 0x80000000000}, {0x20, 0x0, 0x0, [], 0x80000000}, {0x0, 0x0, 0x4}, {0xfffffffffffffffe, 0x0, 0x4}, {0x0, 0x0, 0x0, [], 0x7fff}, {0x0, 0x8, 0xfffffffffffff000, [], 0x7ff}, {0x4, 0x7, 0x0, [], 0xffffffff}, {0x3, 0x5, 0x2}]}})
openat$random(0xffffffffffffff9c, 0x0, 0x80, 0x0)
r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1)
write$FUSE_STATFS(r2, 0x0, 0x0)

[  266.584128] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'.
03:34:27 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfd', @ANYRESHEX=r2])

[  266.626762] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'.
[  266.656314] 9pnet: Insufficient options for proto=fd
03:34:27 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno', @ANYRESHEX=r2])

03:34:27 executing program 3:
r0 = creat(&(0x7f0000002440)='./file0\x00', 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dcbc0d5e0bcfe47bf070")
fallocate(r0, 0x40, 0x0, 0x8001)

[  266.724570] 9pnet: Insufficient options for proto=fd
03:34:27 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  266.804322] 9pnet: Insufficient options for proto=fd
[  266.827460] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  266.852502] SELinux: failed to load policy
03:34:27 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
socket$inet_udp(0x2, 0x2, 0x0)

03:34:27 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno', @ANYRESHEX=r2])

03:34:27 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r1, &(0x7f0000000240)={0xa, 0xfff7fffffffffffe, 0x0, @empty}, 0x1c)
setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@dev, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffc, 0x5}}, 0xe8)
connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c)
sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0)
sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, 0x0}, 0x0)
r2 = syz_open_procfs(0x0, 0x0)
getdents64(r2, 0x0, 0x0)
getdents64(0xffffffffffffffff, 0x0, 0xfd5c)
r3 = creat(0x0, 0x0)
write$cgroup_type(r3, 0x0, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket(0x0, 0x0, 0x0)
getsockname$packet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
write$cgroup_type(0xffffffffffffffff, 0x0, 0x0)

03:34:27 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pwrite64(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, &(0x7f0000000180))
ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000600)={0x2, 0x0, @ioapic={0xf000, 0x0, 0xa75d, 0xffffffff, 0x0, [{0xc6c1, 0x6, 0xffff}, {0x0, 0xda, 0x8}, {0x0, 0x0, 0x0, [], 0xe7}, {0x0, 0x0, 0x8, [], 0x100}, {0x8, 0x0, 0x0, [], 0x1a0}, {0x0, 0x6, 0x0, [], 0x5a6}, {}, {0x0, 0xffffffff}, {0x0, 0xfffffffffffffc10}, {}, {0x0, 0x0, 0x1, [], 0x5}, {0x0, 0x0, 0x0, [], 0x7}, {0x400, 0x0, 0x0, [], 0x4}, {0x0, 0x6}, {}, {0x0, 0x7, 0x4, [], 0x9}, {0x6, 0x22c, 0x6, [], 0x80000000000}, {0x20, 0x0, 0x0, [], 0x80000000}, {0x0, 0x0, 0x4}, {0xfffffffffffffffe, 0x0, 0x4}, {0x0, 0x0, 0x0, [], 0x7fff}, {0x0, 0x8, 0xfffffffffffff000, [], 0x7ff}, {0x4, 0x7, 0x0, [], 0xffffffff}, {0x3, 0x5, 0x2}]}})
openat$random(0xffffffffffffff9c, 0x0, 0x80, 0x0)
r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1)
write$FUSE_STATFS(r2, 0x0, 0x0)

03:34:27 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:27 executing program 1:
mkdir(&(0x7f0000000540)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0)
r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r2, &(0x7f0000000000), 0x12)

[  267.292941] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'.
[  267.380746] 9pnet: Insufficient options for proto=fd
[  267.386847] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  267.416764] SELinux: failed to load policy
03:34:28 executing program 1:
r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x0)
mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0)
mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0)

03:34:28 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:28 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno', @ANYRESHEX=r2])

03:34:28 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pwrite64(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, &(0x7f0000000180))
ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000600)={0x2, 0x0, @ioapic={0xf000, 0x0, 0xa75d, 0xffffffff, 0x0, [{0xc6c1, 0x6, 0xffff}, {0x0, 0xda, 0x8}, {0x0, 0x0, 0x0, [], 0xe7}, {0x0, 0x0, 0x8, [], 0x100}, {0x8, 0x0, 0x0, [], 0x1a0}, {0x0, 0x6, 0x0, [], 0x5a6}, {}, {0x0, 0xffffffff}, {0x0, 0xfffffffffffffc10}, {}, {0x0, 0x0, 0x1, [], 0x5}, {0x0, 0x0, 0x0, [], 0x7}, {0x400, 0x0, 0x0, [], 0x4}, {0x0, 0x6}, {}, {0x0, 0x7, 0x4, [], 0x9}, {0x6, 0x22c, 0x6, [], 0x80000000000}, {0x20, 0x0, 0x0, [], 0x80000000}, {0x0, 0x0, 0x4}, {0xfffffffffffffffe, 0x0, 0x4}, {0x0, 0x0, 0x0, [], 0x7fff}, {0x0, 0x8, 0xfffffffffffff000, [], 0x7ff}, {0x4, 0x7, 0x0, [], 0xffffffff}, {0x3, 0x5, 0x2}]}})
openat$random(0xffffffffffffff9c, 0x0, 0x80, 0x0)
r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1)
write$FUSE_STATFS(r2, 0x0, 0x0)

[  267.549929] audit: type=1400 audit(2000000068.100:16756): avc:  denied  { map } for  pid=13911 comm="syz-executor.1" path="/dev/bus/usb/006/001" dev="devtmpfs" ino=15241 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usb_device_t:s0 tclass=chr_file permissive=1
03:34:28 executing program 1:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00')
r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc))
r2 = syz_open_pts(r1, 0x0)
r3 = dup3(r2, r0, 0x0)
ioctl$TCXONC(r3, 0x540a, 0x1)

[  267.645182] 9pnet: Insufficient options for proto=fd
03:34:28 executing program 4:
pipe2$9p(&(0x7f0000000240), 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r1 = dup(r0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYBLOB=',wfdno=', @ANYRESHEX=r1])

[  267.699819] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  267.766019] SELinux: failed to load policy
[  267.795341] 9pnet: Insufficient options for proto=fd
03:34:28 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
socket$inet_udp(0x2, 0x2, 0x0)

03:34:28 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r3 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r4 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r3, r4, 0x0, 0x88201)
sendmmsg(r3, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r5 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r5, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r5, 0x0, 0x8000fffffffe)
r6 = accept(r5, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r6, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r7, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:28 executing program 4:
pipe2$9p(&(0x7f0000000240), 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r1 = dup(r0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYBLOB=',wfdno=', @ANYRESHEX=r1])

03:34:28 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pwrite64(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, &(0x7f0000000180))
ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000600)={0x2, 0x0, @ioapic={0xf000, 0x0, 0xa75d, 0xffffffff, 0x0, [{0xc6c1, 0x6, 0xffff}, {0x0, 0xda, 0x8}, {0x0, 0x0, 0x0, [], 0xe7}, {0x0, 0x0, 0x8, [], 0x100}, {0x8, 0x0, 0x0, [], 0x1a0}, {0x0, 0x6, 0x0, [], 0x5a6}, {}, {0x0, 0xffffffff}, {0x0, 0xfffffffffffffc10}, {}, {0x0, 0x0, 0x1, [], 0x5}, {0x0, 0x0, 0x0, [], 0x7}, {0x400, 0x0, 0x0, [], 0x4}, {0x0, 0x6}, {}, {0x0, 0x7, 0x4, [], 0x9}, {0x6, 0x22c, 0x6, [], 0x80000000000}, {0x20, 0x0, 0x0, [], 0x80000000}, {0x0, 0x0, 0x4}, {0xfffffffffffffffe, 0x0, 0x4}, {0x0, 0x0, 0x0, [], 0x7fff}, {0x0, 0x8, 0xfffffffffffff000, [], 0x7ff}, {0x4, 0x7, 0x0, [], 0xffffffff}, {0x3, 0x5, 0x2}]}})
openat$random(0xffffffffffffff9c, 0x0, 0x80, 0x0)
r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1)
write$FUSE_STATFS(r2, 0x0, 0x0)

03:34:28 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r1, &(0x7f0000000240)={0xa, 0xfff7fffffffffffe, 0x0, @empty}, 0x1c)
setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@dev, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffc, 0x5}}, 0xe8)
connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c)
sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0)
sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, 0x0}, 0x0)
r2 = syz_open_procfs(0x0, 0x0)
getdents64(r2, 0x0, 0x0)
getdents64(0xffffffffffffffff, 0x0, 0xfd5c)
r3 = creat(0x0, 0x0)
write$cgroup_type(r3, 0x0, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket(0x0, 0x0, 0x0)
getsockname$packet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
write$cgroup_type(0xffffffffffffffff, 0x0, 0x0)

03:34:28 executing program 1:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a5ffffff00090000ff0700000000000000000000000000000000000000ffffff81000004800000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}])

[  268.211296] 9pnet: Insufficient options for proto=fd
[  268.248248] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:34:28 executing program 4:
pipe2$9p(&(0x7f0000000240), 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r1 = dup(r0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYBLOB=',wfdno=', @ANYRESHEX=r1])

[  268.296606] SELinux: failed to load policy
03:34:28 executing program 2:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="0001000025"], 0x1}}, 0x0)
syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000180)="cefaad1bb83c000000dc", 0xffffffffffffff78}], 0x8840, 0x0)

[  268.434617]  loop1: p1 p3
[  268.448583] loop1: partition table partially beyond EOD, truncated
[  268.482770] 9pnet: Insufficient options for proto=fd
03:34:29 executing program 4:
pipe2$9p(&(0x7f0000000240), 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r1 = dup(r0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1])

03:34:29 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r3 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r4 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r3, r4, 0x0, 0x88201)
sendmmsg(r3, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r5 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r5, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r5, 0x0, 0x8000fffffffe)
r6 = accept(r5, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r6, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r7, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:29 executing program 1:
r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x8000, 0x0)
ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f00000000c0)={0xc, @raw_data="fbe5521652ad89c82c7d0c2965329105ea59c3194b668337a7848f4f524e818a9aba1c39282d75e1631ebd07f86012278503fa37b68086378195163497cdec09410894eda7294125b241e823e795a20ca8c3129e38bb46de41ddfe04391b7bf569a0e0d4ff4dd77de601a194834a991c6a2b2084b2ad9c31eeb146e51d3dc6cf876b5046f121ddee754cc3e214ea829ad11f2eb0ebd66bd525d4934eeb670572ca25d9ef0ec8512725cc2ec2a8574272299f00a2d7f3a1732ceb9b296672bb42897834c823d9ea37"})

[  268.532254] loop1: p1 start 2304 is beyond EOD, truncated
[  268.569942] loop1: p3 start 128 is beyond EOD, truncated
03:34:29 executing program 3:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*', 0x8002})
r1 = socket$inet6(0xa, 0x2, 0x0)
ioctl$sock_ifreq(r1, 0x8922, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x00', @ifru_addrs=@sco})

[  268.675304] BFS-fs: bfs_fill_super(): Inode 0x00000006 corrupted
[  268.694817] 9pnet: Insufficient options for proto=fd
[  268.723690] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  268.774472] SELinux: failed to load policy
[  268.775070] eql: Invalid MTU 31 requested, hw min 68
03:34:40 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:34:40 executing program 1:
r0 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8)
connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c)

03:34:40 executing program 4:
pipe2$9p(&(0x7f0000000240), 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r1 = dup(r0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1])

03:34:40 executing program 2:
msgsnd(0x0, 0x0, 0x0, 0x0)
msgrcv(0x0, 0x0, 0x0, 0x3, 0x0)

03:34:40 executing program 3:

03:34:40 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r3 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r4 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r3, r4, 0x0, 0x88201)
sendmmsg(r3, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r5 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r5, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r5, 0x0, 0x8000fffffffe)
r6 = accept(r5, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r6, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r7, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:40 executing program 2:

[  279.556064] 9pnet: Insufficient options for proto=fd
03:34:40 executing program 3:

03:34:40 executing program 1:

03:34:40 executing program 4:
pipe2$9p(&(0x7f0000000240), 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r1 = dup(r0)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1])

03:34:40 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, &(0x7f0000000040))
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  279.586181] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  279.621814] SELinux: failed to load policy
03:34:40 executing program 1:

[  279.682078] 9pnet: Insufficient options for proto=fd
[  279.747441] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  279.777359] SELinux: failed to load policy
03:34:40 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:34:40 executing program 2:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*', 0x8002})
ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@broadcast]})

03:34:40 executing program 3:
socket$inet(0x10, 0x0, 0x0)
semget(0x0, 0x0, 0x0)
syz_open_dev$midi(0x0, 0x0, 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
syz_genetlink_get_family_id$net_dm(&(0x7f0000000680)='NET_DM\x00')
sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unshare(0x8000000)
mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0)
mq_timedsend(0xffffffffffffffff, 0x0, 0x2d1, 0x0, 0x0)
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100))
r1 = syz_open_pts(r0, 0x0)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0x6)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

03:34:40 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2])

03:34:40 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
r1 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x8000, 0x0)
ioctl$VIDIOC_TRY_FMT(r1, 0xc040565f, &(0x7f0000000280)={0xa, @pix_mp={0x0, 0x0, 0x4c47504a}})
ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000040)={0x0, "21e0c5224a73be048ee664b52a707b08e5b2e74368b0195e77eb15cb35b3b154", 0x5, 0x2, 0x2, 0x800, 0x1, 0x3, 0x4f, 0x8001})
sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f00000000c0)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
recvmmsg(r0, &(0x7f0000004a40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}}], 0x8000000000003b0, 0x0, 0x0)
socketpair(0x9, 0x5, 0x6, &(0x7f0000000000))

03:34:40 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, &(0x7f0000000040))
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:41 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2])

[  280.419534] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:34:41 executing program 1:
syz_open_dev$evdev(0x0, 0x0, 0x0)
write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmmsg(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001700)}}], 0x40000e5, 0x0)

[  280.499563] SELinux: failed to load policy
03:34:41 executing program 2:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*', 0x8002})
ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@broadcast]})

03:34:41 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2])

03:34:41 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, &(0x7f0000000040))
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:41 executing program 3:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0)
ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000240)={0x20000135, &(0x7f0000000000)=[{}, {0x0, 0x0, 0x8}]})
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0185879, 0x20000000)

[  280.679969] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  280.728680] SELinux: failed to load policy
03:34:41 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:34:41 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1331045151d1a20f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

03:34:41 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070")
r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc))
r2 = syz_open_pts(r1, 0x40000000002)
fcntl$dupfd(r1, 0x0, r1)
ioctl$TCSETSF(r2, 0x5404, &(0x7f0000001240)={0xfffffffffffffff8, 0xffff})
r3 = dup3(r2, r1, 0x0)
write$UHID_INPUT(r3, &(0x7f0000000140)={0x8, "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", 0x1000}, 0x1006)

03:34:41 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, 0x0)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:41 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2])

03:34:41 executing program 1:
creat(&(0x7f0000000040)='./file0\x00', 0x0)
mount$9p_tcp(&(0x7f0000000100)='1\n7.0.0.1\x04', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000780)={'trans=tcp,', {'port'}, 0x2c, {[], [], 0xfffffffe}})

03:34:41 executing program 1:
r0 = socket(0x40000000001e, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
getsockopt(r0, 0x800000010f, 0x83, &(0x7f00004ad000), &(0x7f0000a3c000)=0x100000316)

03:34:41 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2])

03:34:41 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2])

[  281.333431] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:34:42 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, 0x0)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:42 executing program 1:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
fsetxattr$trusted_overlay_origin(r0, 0x0, 0x0, 0x0, 0x0)

[  281.412042] SELinux: failed to load policy
03:34:42 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2])

[  281.527592] 9pnet: Could not find request transport: fd0x0000000000000003
[  281.535666] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  281.583495] SELinux: failed to load policy
03:34:53 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
gettid()
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:34:53 executing program 2:
socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300))
pipe(&(0x7f00000001c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
socket$pppoe(0x18, 0x1, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socket$inet_udplite(0x2, 0x2, 0x88)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0)
finit_module(r2, &(0x7f0000000280)='\x00', 0x2)
bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10)
setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x3c2)
sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10)
sendmmsg$inet(r1, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000380)='+', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)='Y', 0x200001c1}], 0x1}}], 0x2, 0x4008800)
write$9p(r0, &(0x7f00000000c0)="e6", 0x1)
syz_open_dev$dri(0x0, 0x0, 0x0)
ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000200)={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x6, @random="4edce0e8654c"}, 0x462644440e24df9, {0x2, 0x4e23, @local}, 'bcsf0\x00'})
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, 0x0)
mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0)

03:34:53 executing program 3:
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x6, 0x5, 0x680a, 0x5}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48)

03:34:53 executing program 1:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801})
ioctl$TUNSETLINK(r0, 0x400454cd, 0x0)
r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r1)
socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0')
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)

03:34:53 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2])

03:34:53 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, 0x0)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:53 executing program 3:
socket$inet_udplite(0x2, 0x2, 0x88)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
r1 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
ptrace$setopts(0x4206, r1, 0x0, 0x0)
tkill(r0, 0x20)
ptrace$cont(0x18, r1, 0x0, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x34})
ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r1, 0x0, 0x0)

[  292.986068] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  293.021104] SELinux: failed to load policy
[  293.026364] 9pnet: Could not find request transport: fd0x0000000000000003
03:34:53 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:53 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2])

03:34:53 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x400000000000001, 0x0, 0x0, 0x2}, 0x10}}, 0x0)

[  293.103260] ptrace attach of "/root/syz-executor.3"[14143] was attempted by "/root/syz-executor.3"[14144]
[  293.136729] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:34:53 executing program 1:
r0 = socket(0x40000000001e, 0x1, 0x0)
getsockopt(r0, 0x800000010f, 0x83, &(0x7f00004ad000), &(0x7f0000a3c000)=0x100000316)

[  293.163510] SELinux: failed to load policy
[  293.177511] 9pnet: Could not find request transport: fd0x0000000000000003
03:34:53 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  293.268165] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  293.284375] SELinux: failed to load policy
03:34:54 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
gettid()
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:34:54 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2])

03:34:54 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070")
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
write$cgroup_int(r1, &(0x7f0000000080), 0xfffffca0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x536e)

03:34:54 executing program 1:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r0)

03:34:54 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:54 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x2, 0xc)
write(r0, &(0x7f0000000140)="1f0000000104fffffd3b54c007110000f305010004000200000000000200cf", 0x2e4)

03:34:54 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0)
ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x100000001)
mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x24012, r1, 0x0)
readv(r1, &(0x7f0000000ac0)=[{0x0}, {0x0}, {&(0x7f0000000a40)=""/78, 0x4e}], 0x3)

[  293.854600] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  293.863704] 9pnet: Insufficient options for proto=fd
03:34:54 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2])

[  293.895792] SELinux: failed to load policy
03:34:54 executing program 2:
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'})
ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)

03:34:54 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
r1 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x8000, 0x0)
ioctl$VIDIOC_TRY_FMT(r1, 0xc040565f, &(0x7f0000000280)={0xa, @pix_mp={0x0, 0x0, 0x4c47504a}})
ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, 0x0)
sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000004a40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}}], 0x8000000000003b0, 0x0, 0x0)

[  294.029090] 9pnet: Insufficient options for proto=fd
[  294.066248] input: syz0 as /devices/virtual/input/input29
03:34:54 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2])

03:34:54 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, 0x0)
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  294.192502] input: syz0 as /devices/virtual/input/input30
[  294.224923] 9pnet: Insufficient options for proto=fd
[  294.298792] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  294.322780] SELinux: failed to load policy
03:34:55 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
gettid()
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:34:55 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
r1 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x8000, 0x0)
ioctl$VIDIOC_TRY_FMT(r1, 0xc040565f, &(0x7f0000000280)={0xa, @pix_mp={0x0, 0x0, 0x4c47504a}})
ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, 0x0)
sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000004a40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}}], 0x8000000000003b0, 0x0, 0x0)

03:34:55 executing program 2:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00', 0x4})
ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51)
ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0)

03:34:55 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2])

03:34:55 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, 0x0)
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:55 executing program 3:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0)
ioctl$BLKFLSBUF(r0, 0x1261, 0x0)

03:34:55 executing program 1:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00')
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c)
sendfile(r0, r1, &(0x7f0000000040)=0x200000, 0x8001)
accept(0xffffffffffffffff, 0x0, 0x0)
setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x7c)
shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil)
ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0)

[  294.746228] 9pnet: Insufficient options for proto=fd
[  294.752049] input: syz0 as /devices/virtual/input/input31
[  294.771761] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:34:55 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2])

[  294.797263] SELinux: failed to load policy
03:34:55 executing program 3:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={<r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$jfs(&(0x7f0000000200)='jfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@uid={'uid'}}], [{@fowner_gt={'fowner>'}}]})

03:34:55 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, 0x0)
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:55 executing program 1:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/psched\x00')
close(r0)

03:34:55 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0)
getsockname(r1, &(0x7f00000001c0)=@caif=@dgm, &(0x7f0000000140)=0x80)

[  294.899970] 9pnet: Insufficient options for proto=fd
[  294.951466] jfs: Unrecognized mount option "fowner>00000000000000000000" or missing value
[  294.993476] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  295.024744] SELinux: failed to load policy
03:34:56 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
tkill(0x0, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:34:56 executing program 4:
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0)
r2 = dup(r1)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2])

03:34:56 executing program 2:
recvmmsg(0xffffffffffffff9c, &(0x7f0000008880)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000240)=""/62, 0x3e}], 0x1}}], 0x1, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000280)='mountinfo\x00')
preadv(r0, &(0x7f0000000480), 0x10000000000000e1, 0x0)

03:34:56 executing program 3:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
r2 = dup2(r1, r1)
sendmmsg$alg(r2, &(0x7f0000006e00)=[{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000240)="10", 0x1}], 0x1, &(0x7f0000000480)=[@assoc={0x18}], 0x18}], 0x1, 0x0)

03:34:56 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x6, 0x0, 0x680a, 0x5}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48)

03:34:56 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x0, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:56 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = socket(0x10, 0x80002, 0xc)
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x14, 0x0, 0x6, 0x319}, 0x14}}, 0x0)
sendmmsg$alg(r1, &(0x7f0000000140), 0x492492492492805, 0x0)
ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070")

[  295.571750] 9pnet: Insufficient options for proto=fd
[  295.579272] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:34:56 executing program 2:
r0 = socket$inet_smc(0x2b, 0x1, 0x0)
setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000040)={0x6, @remote, 0x0, 0x0, 'lblcr\x00'}, 0x2c)

[  295.626683] SELinux: failed to load policy
03:34:56 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7')
write$FUSE_NOTIFY_POLL(r1, 0x0, 0x0)

03:34:56 executing program 3:
r0 = socket$inet6(0xa, 0x3, 0x8)
ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="0f"]})

03:34:56 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x0, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:56 executing program 2:
r0 = memfd_create(&(0x7f00000012c0)='}\xbf*x\x89-vO\xd3\x01Uk2Qo\xb5\x91\xd0\xd0\xb8Vb\xe8*l\xdcC\xeb\xa6\xe4\x12$\xd1\xa3zz\x85\xf4\x1e\xcc\xfc\xf6\xb6__\xec\xef\x1b\x9d\x0ePw\x1bN[\x81\x92\x15P\xc51\x9eR\bjh\xce\xa9j\xda\xf8B\x84\x8d\x12.\xcb\x95\x9a\n\xb24\xd0\xd1\x87N\xc5Os\"\xfc\f\xfa~$1\xbe\v\xd5aI*Y\xb0W*-W\v\x00\x00\xf9\x02Q\x10\xc9Uv\x9f;f\x0f\xa2\xfa\x84\xe1i\x19\xc3/\x10&\x94\x9b\xe5\x83\xa9\x93E\x9b\xdas\xbc\v\xbd\xaf\xe3\x17\x82[g.\xe3\xc9\xf5iX5\xf8\x02h\xb8:l&\xd0]\x7f5<8{\xc8jh\xa4\xf1\nS\x17\xf8v\xbe\xe5P\xe0_\xb4\xc1\xce\xd2+\x86b\x065', 0x0)
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0)
mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0)
munlock(&(0x7f0000fff000/0x1000)=nil, 0x1000)
r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00')
readv(r1, &(0x7f00000021c0)=[{&(0x7f0000000140)=""/79, 0x90d}, {&(0x7f00000001c0)=""/4096, 0x1000}], 0x2)

[  295.785365] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  295.797377] SELinux: failed to load policy
03:34:56 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
tkill(0x0, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:34:56 executing program 4:
r0 = socket(0x40000000001e, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
getsockopt(r0, 0x800000010f, 0x87, &(0x7f00004ad000), &(0x7f0000a3c000)=0x100000316)

03:34:56 executing program 3:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet6_udplite(0xa, 0x2, 0x88)
getsockopt$inet6_opts(r1, 0x29, 0x11, &(0x7f0000000240)=""/139, &(0x7f0000000300)=0x8b)

03:34:56 executing program 2:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0)
ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/12)

03:34:56 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x0, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:56 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000000100)={0x2, 0x20000004e20, @broadcast}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x24000000, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x10)
sendto$inet(r0, &(0x7f00000001c0)="83", 0x1, 0x4081, 0x0, 0x0)
sendto$inet(r0, &(0x7f0000000140)='-', 0x1, 0x4000001, 0x0, 0x0)

03:34:57 executing program 3:
perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x91)

03:34:57 executing program 4:
perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x230, &(0x7f0000007000)={@local, @random="cf2bb43c09b8", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @tcp={{0x0, 0x15, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0)

[  296.445260] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  296.464304] SELinux: failed to load policy
03:34:57 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:57 executing program 2:
r0 = socket(0x40000000001e, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
getsockopt(r0, 0x800000010f, 0x84, &(0x7f00004ad000), &(0x7f0000a3c000)=0x100000316)

03:34:57 executing program 1:
io_setup(0x91, &(0x7f00000001c0)=<r0=>0x0)
io_submit(r0, 0x70, &(0x7f0000001440))

03:34:57 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

[  296.597108] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:34:57 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
tkill(0x0, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:34:57 executing program 2:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$alg(0x26, 0x5, 0x0)
gettid()
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0)
r1 = openat$cgroup_subtree(r0, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0)
close(r1)
openat$cgroup_int(r0, &(0x7f0000000280)='io.max\x00', 0x2, 0x0)
r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TIOCGPTPEER(r2, 0x5441, 0x0)
ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)={0x4, 0x100000001, 0xbb52, 0x7d, 0x3, 0x9, 0x4, 0xd12, 0xffff, 0x1, 0x6})
recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0}, 0x1}], 0x1, 0x0, 0x0)
readv(r1, &(0x7f00000002c0), 0x1a5)

03:34:57 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:34:57 executing program 1:
r0 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4000004, 0x31, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000140))

03:34:57 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:57 executing program 4:
pipe(&(0x7f0000000040)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
writev(r1, &(0x7f0000000100)=[{&(0x7f0000000800)="580000001400adfd8a987e40da2e6a262b", 0x11}], 0x1)
close(r2)
socket$netlink(0x10, 0x3, 0x2000000000004)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0)

03:34:57 executing program 1:
pipe(&(0x7f0000000040)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070")
writev(r1, &(0x7f0000000100)=[{&(0x7f0000000800)="580000001400adfd8a987e40da2e6a", 0xf}], 0x1)
close(r2)
socket$netlink(0x10, 0x3, 0x2000000000004)
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="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")
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0)

03:34:57 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={<r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$jfs(&(0x7f0000000200)='jfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@nointegrity='nointegrity'}], [{@uid_lt={'uid<'}}]})

03:34:57 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:34:57 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  297.337021] SELinux:  policydb magic number 0x70616d73 does not match expected magic number 0xf97cff8c
[  297.360881] selinux_nlmsg_perm: 20 callbacks suppressed
[  297.360892] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=14388 comm=syz-executor.4
[  297.407858] jfs: Unrecognized mount option "uid<00000000000000000000" or missing value
[  297.434404] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=14398 comm=syz-executor.1
03:34:58 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:34:58 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, 0x0, 0x0)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  297.451052] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=14388 comm=syz-executor.4
[  297.462485] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  297.469661] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=14398 comm=syz-executor.1
[  297.493851] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=14388 comm=syz-executor.4
[  297.533179] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=14398 comm=syz-executor.1
[  297.566643] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=14388 comm=syz-executor.4
[  297.589367] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=14398 comm=syz-executor.1
[  297.604748] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  297.621151] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=14388 comm=syz-executor.4
[  297.644304] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=14388 comm=syz-executor.4
03:34:58 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180))
r1 = gettid()
tkill(r1, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:34:58 executing program 2:
r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c)
connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000001280)={0x0, 0x2}, 0x14)

03:34:58 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet(0x10, 0x3, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:34:58 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, 0x0, 0x0)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:58 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet(0x10, 0x3, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:34:58 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0)

[  298.159934] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  298.199077] sel_write_load: 4 callbacks suppressed
[  298.199098] SELinux: failed to load policy
03:34:58 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
pipe(&(0x7f00000002c0)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0)

03:34:58 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, 0x0, 0x0)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:34:58 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet(0x10, 0x3, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:34:58 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0)

03:34:58 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:34:58 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0)

[  298.342607] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  298.370753] SELinux: failed to load policy
03:35:10 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180))
r1 = gettid()
tkill(r1, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:35:10 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:35:10 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:35:10 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0)

03:35:10 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0)
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)

03:35:10 executing program 1:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x2, 0x0)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd)
write(r0, &(0x7f0000000040)="e0", 0xfffffe00)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
poll(&(0x7f00000000c0)=[{r0}, {r1, 0xc22f}], 0x2, 0x0)

03:35:10 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000000006, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000))

03:35:10 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:35:10 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0)

[  309.669715] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:35:10 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  309.718117] SELinux: failed to load policy
03:35:10 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$alg(0x26, 0x5, 0x0)
gettid()
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0)
r1 = openat$cgroup_subtree(r0, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0)
close(r1)
openat$cgroup_int(r0, &(0x7f0000000280)='io.max\x00', 0x2, 0x0)
r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x0)
ioctl$TCSETSW(r3, 0x5403, &(0x7f0000000040)={0x4, 0x0, 0x0, 0x7d, 0x3, 0x9, 0x4, 0xd12, 0x0, 0x1, 0x6, 0x6})
recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0}, 0x1}], 0x1, 0x0, 0x0)
readv(r1, &(0x7f00000002c0), 0x1a5)

03:35:10 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

[  309.841548] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  309.852235] SELinux: failed to load policy
03:35:21 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180))
r1 = gettid()
tkill(r1, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:35:21 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0)

03:35:21 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:35:21 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0)

03:35:21 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:35:21 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup(r0)
recvmsg(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x40012003)

03:35:21 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0)

03:35:21 executing program 2:
r0 = gettid()
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000))
shmget$private(0x0, 0x3000, 0x0, &(0x7f0000e7f000/0x3000)=nil)
timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0)
socketpair(0x0, 0x0, 0x0, 0x0)
r1 = inotify_init()
ftruncate(r1, 0x0)
tkill(r0, 0x15)

03:35:21 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  321.168919] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  321.207463] SELinux: failed to load policy
03:35:21 executing program 1:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0)
lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340))

03:35:21 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:35:21 executing program 4:
bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0)

[  321.324001] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  321.383425] SELinux: failed to load policy
03:35:33 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
timer_settime(0x0, 0x0, &(0x7f0000000140), 0x0)
r1 = gettid()
tkill(r1, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:35:33 executing program 4:
bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0)

03:35:33 executing program 2:
bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10)
io_setup(0x2, &(0x7f0000000200)=<r0=>0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x806, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002})
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={<r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
io_submit(r0, 0x8, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000040), 0x10304}])

03:35:33 executing program 3:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:35:33 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0)
r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x6, 0x13, 0x0, 0x1, 0x10, 0x8, 0x9, 0x100000000, 0x0, 0x0, 0x5, 0x16c75082, 0xc95, 0x3, 0x4, 0x0, 0x200, 0x7fffffff, 0x1, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x400000000000, 0x200, 0x5464, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x886, 0x6, @perf_bp={0x0, 0x6}, 0xfb96012c798dd902, 0x4, 0x8, 0x0, 0x0, 0x480000000000, 0x9}, 0x0, 0xf, r1, 0x2)
gettid()
gettid()
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0)
perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x4, 0xfff, 0x7, 0x401, 0x0, 0x3, 0x2000, 0x1, 0x0, 0x44d2, 0x1420, 0x0, 0x6196, 0x5, 0x9, 0x0, 0x0, 0x7fff, 0x7, 0x0, 0x9, 0xffffffffffffff51, 0x3, 0x1ff, 0x0, 0x7, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000140), 0x4}, 0x400, 0xe25, 0x2566}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x1)
close(r1)
socket$kcm(0x2, 0x3, 0x2)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x541b, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N')

03:35:33 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:35:33 executing program 3:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:35:33 executing program 4:
bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0)

[  332.699313] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  332.717805] SELinux: failed to load policy
03:35:33 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:35:33 executing program 1:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$nl_netfilter(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x14, 0x1, 0x1, 0xffffffffffffffff, 0x70bd29}, 0x14}}, 0x0)

03:35:33 executing program 3:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:35:33 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0)

[  332.838554] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  332.906253] SELinux: failed to load policy
03:35:44 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0)

03:35:44 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = inotify_init()
poll(&(0x7f0000000100)=[{r1}], 0x1, 0x6)

03:35:44 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
timer_settime(0x0, 0x0, &(0x7f0000000140), 0x0)
r1 = gettid()
tkill(r1, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:35:44 executing program 3:
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:35:44 executing program 1:
r0 = gettid()
r1 = syz_open_procfs(r0, &(0x7f0000000200)='loginuid\x00')
exit(0x0)
writev(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)='0', 0x1}], 0x1)

03:35:44 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, 0x0, 0x0)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:35:44 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0)

03:35:44 executing program 3:
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:35:44 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, 0x0, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0)

03:35:44 executing program 2:
r0 = socket(0x40000000001e, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
getsockopt(r0, 0x800000010f, 0x89, &(0x7f00004ad000), &(0x7f0000a3c000)=0x100000316)

03:35:44 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, 0x0, 0x0)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  344.213420] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  344.237618] SELinux: failed to load policy
03:35:44 executing program 3:
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:35:44 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, 0x0, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0)

03:35:44 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0)
umount2(&(0x7f0000000500)='./file0\x00', 0x9)

[  344.367188] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  344.401452] SELinux: failed to load policy
03:35:56 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, 0x0, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0)

03:35:56 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
timer_settime(0x0, 0x0, &(0x7f0000000140), 0x0)
r1 = gettid()
tkill(r1, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:35:56 executing program 3:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:35:56 executing program 2:
r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xf46e, 0x0)
ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000080))

03:35:56 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, 0x0, 0x0)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:35:56 executing program 1:
r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0)
r1 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x401)
r2 = dup2(r1, r0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001400)={{{@in6=@mcast1, @in6=@ipv4={[], [], @local}}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000001500)=0xe8)
ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'})
write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76)

03:35:56 executing program 3:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:35:56 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0)

[  355.727856] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:35:56 executing program 1:
bind$inet6(0xffffffffffffffff, 0x0, 0x0)
socket$inet6(0xa, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/.yz1\x00', 0x1ff)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0)
sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x4000800, 0x0, 0x0)

[  355.768237] SELinux: failed to load policy
03:35:56 executing program 3:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:35:56 executing program 2:
r0 = open(&(0x7f0000000000)='./bus\x00', 0x40000141042, 0x0)
write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0x323)
creat(&(0x7f0000000380)='./bus\x00', 0x0)
r1 = getpid()
sched_setscheduler(r1, 0x5, &(0x7f0000000180))
r2 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0)
r3 = socket(0x10, 0x80002, 0x0)
bind$netlink(r3, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc)
write(r3, &(0x7f0000000140)="2600000022004701050000000000000005006d", 0x13)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000b4bffc), 0x4)
sendto(r3, &(0x7f0000000340), 0xac, 0x0, 0x0, 0x0)
write$binfmt_misc(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="3ee282ed0a5ebb8fc5eb06e23c844424"], 0x1)
sendfile(r0, r2, &(0x7f0000000080), 0x9001)

03:35:56 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:35:56 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0)

[  355.961331] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  356.001735] SELinux: failed to load policy
[  356.041565] selinux_nlmsg_perm: 2084 callbacks suppressed
[  356.041577] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14695 comm=syz-executor.2
[  356.133975] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14711 comm=syz-executor.2
03:36:07 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r0=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r0+30000000}}, 0x0)
r1 = gettid()
tkill(r1, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:36:07 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0)

03:36:07 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:36:07 executing program 1:
pipe(0x0)
pipe(0x0)
ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0)
timerfd_create(0x0, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
pipe(0x0)
write(0xffffffffffffffff, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmmsg(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001700)}}], 0x40000e5, 0x0)

03:36:07 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:36:07 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e62cfe47bf070")
bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080), 0x4)

03:36:07 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x40000000002)
fcntl$dupfd(r0, 0x0, r0)
ioctl$TCSETSF(r1, 0x5404, &(0x7f0000001240)={0x0, 0xffff})
r2 = dup3(r1, r0, 0x0)
write$UHID_INPUT(r2, &(0x7f0000000140)={0xd, "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", 0x1000}, 0x1006)

03:36:07 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:36:07 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000cfd000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)

[  367.271138] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:36:07 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  367.319755] SELinux: failed to load policy
03:36:07 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:36:08 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x0, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

[  367.454023] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  367.524680] SELinux: failed to load policy
03:36:08 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r0=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r0+30000000}}, 0x0)
r1 = gettid()
tkill(r1, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:36:08 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00adc2d8", 0x24)

03:36:08 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, 0x0)
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:36:08 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x0, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:36:08 executing program 1:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e0000000000000008000000000000f7ffffff00000000ffffe00024419beb796a708b00020000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xf8}}, 0x0)
sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001c000705000000000000000000000400"], 0x14}}, 0x0)

03:36:08 executing program 4:
r0 = socket(0x40000000001e, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
getsockopt(r0, 0x800000010f, 0x82, &(0x7f00004ad000), &(0x7f0000a3c000)=0x100000316)

03:36:08 executing program 1:
write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00'}, 0x45c)
r0 = gettid()
r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x1)
write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="2321202e2f66696c65300a795b1130e9de48421470c8f6832c917b85e0c14d87c4df8a1f8589a5e8064c3189ad1bffffff7f00000000711649b422c31c4641e6e69d876d70a0db767eedb4b1ee0908281ad4f9"], 0xb)
munlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

03:36:08 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x0, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:36:08 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00adc2d8", 0x24)

03:36:08 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070")
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
setsockopt$sock_int(r1, 0x1, 0x20, &(0x7f0000000380), 0x4)

[  368.191301] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  368.218346] SELinux: failed to load policy
03:36:08 executing program 4:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000200000000000000007b119800000000009500200000000000edfa53736d9e8c93b06c5b69639524bc3e32af1d7abc36efc1df21dc"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)

[  368.266228] ptrace attach of "/root/syz-executor.1"[14777] was attempted by "/root/syz-executor.1"[14781]
03:36:08 executing program 1:
write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00'}, 0x45c)
r0 = gettid()
r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x1)
write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="2321202e2f66696c65300a795b1130e9de48421470c8f6832c917b85e0c14d87c4df8a1f8589a5e8064c3189ad1bffffff7f00000000711649b422c31c4641e6e69d876d70a0db767eedb4b1ee0908281ad4f9"], 0xb)
munlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

03:36:09 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r0=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r0+30000000}}, 0x0)
r1 = gettid()
tkill(r1, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:36:09 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet(0x10, 0x3, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:36:09 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00adc2d8", 0x24)

03:36:09 executing program 4:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
write(r0, &(0x7f0000000040)="170000001500070500e80000004c03050a080303f40000", 0x17)

03:36:09 executing program 1:
write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00'}, 0x45c)
r0 = gettid()
r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x1)
write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="2321202e2f66696c65300a795b1130e9de48421470c8f6832c917b85e0c14d87c4df8a1f8589a5e8064c3189ad1bffffff7f00000000711649b422c31c4641e6e69d876d70a0db767eedb4b1ee0908281ad4f9"], 0xb)
munlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

03:36:09 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, 0x0)
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:36:09 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00adc2d8", 0x24)

03:36:09 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet(0x10, 0x3, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:36:09 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
r1 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x8000, 0x0)
ioctl$VIDIOC_TRY_FMT(r1, 0xc040565f, &(0x7f0000000280)={0xa, @pix_mp={0x0, 0x0, 0x4c47504a}})
ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000040)={0x0, "21e0c5224a73be048ee664b52a707b08e5b2e74368b0195e77eb15cb35b3b154", 0x5, 0x2, 0x2, 0x800, 0x1, 0x3, 0x4f})
sendto(0xffffffffffffffff, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f00000000c0)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
recvmmsg(r0, &(0x7f0000004a40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}}], 0x8000000000003b0, 0x0, 0x0)
socketpair(0x9, 0x5, 0x6, &(0x7f0000000000))

[  369.062564] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:36:09 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:36:09 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00adc2d8", 0x24)

[  369.130171] ptrace attach of "/root/syz-executor.1"[14815] was attempted by "/root/syz-executor.1"[14821]
[  369.134666] SELinux: failed to load policy
03:36:09 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet(0x10, 0x3, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:36:10 executing program 5:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:36:10 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, 0x0)
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:36:10 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
r1 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x8000, 0x0)
ioctl$VIDIOC_TRY_FMT(r1, 0xc040565f, &(0x7f0000000280)={0xa, @pix_mp={0x0, 0x0, 0x4c47504a}})
ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000040)={0x0, "21e0c5224a73be048ee664b52a707b08e5b2e74368b0195e77eb15cb35b3b154", 0x5, 0x2, 0x2, 0x800, 0x1, 0x3, 0x4f})
sendto(0xffffffffffffffff, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f00000000c0)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
recvmmsg(r0, &(0x7f0000004a40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}}], 0x8000000000003b0, 0x0, 0x0)
socketpair(0x9, 0x5, 0x6, &(0x7f0000000000))

03:36:10 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00adc2d8", 0x24)

03:36:10 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:36:10 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, 0x0, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:36:10 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00adc2d8", 0x24)

03:36:10 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:36:10 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:36:10 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, 0x0, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

[  369.790539] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  369.813973] SELinux: failed to load policy
03:36:10 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(0xffffffffffffffff, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:36:10 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00adc2d8", 0x24)

[  369.978546] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  370.008746] SELinux: failed to load policy
03:36:21 executing program 5:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:36:21 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:36:21 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00adc2d8", 0x24)

03:36:21 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, 0x0, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:36:21 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(0xffffffffffffffff, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:36:21 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:36:21 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
readv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:36:21 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:36:21 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00adc2d8", 0x24)

[  381.356755] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  381.391095] SELinux: failed to load policy
03:36:22 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00adc2d8", 0x24)

03:36:22 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
readv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:36:22 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(0xffffffffffffffff, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  381.666991] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  381.680603] SELinux: failed to load policy
03:36:33 executing program 5:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:36:33 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:36:33 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00adc2d8", 0x24)

03:36:33 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
readv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:36:33 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, 0xffffffffffffffff, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r5 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r5, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r5, 0x0, 0x8000fffffffe)
r6 = accept(r5, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r6, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r7, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:36:33 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:36:33 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00adc2d8", 0x24)

03:36:33 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
socket$inet_udplite(0x2, 0x2, 0x88)
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r1, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

[  392.846815] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:36:33 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

[  392.890852] SELinux: failed to load policy
03:36:33 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, 0x0, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00adc2d8", 0x24)

03:36:33 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, 0xffffffffffffffff, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r5 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r5, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r5, 0x0, 0x8000fffffffe)
r6 = accept(r5, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r6, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r7, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:36:33 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, 0x0, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00adc2d8", 0x24)

[  393.055494] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  393.098099] SELinux: failed to load policy
03:36:44 executing program 5:
timer_create(0x0, 0x0, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:36:44 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, 0x0, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00adc2d8", 0x24)

03:36:44 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, 0xffffffffffffffff, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r5 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r5, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r5, 0x0, 0x8000fffffffe)
r6 = accept(r5, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r6, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r7, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:36:44 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
socket$inet_udplite(0x2, 0x2, 0x88)
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r1, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:36:44 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:36:44 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:36:44 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00adc2d8", 0x24)

03:36:44 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
socket$inet_udplite(0x2, 0x2, 0x88)
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r1, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:36:44 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

[  404.357907] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  404.386979] SELinux: failed to load policy
03:36:45 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00adc2d8", 0x24)

03:36:45 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00adc2d8", 0x24)

03:36:45 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r1, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:36:56 executing program 5:
timer_create(0x0, 0x0, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:36:56 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:36:56 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x0)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:36:56 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r1, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:36:56 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0)

03:36:56 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:36:56 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:36:56 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r1, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:36:56 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0)

03:36:56 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x0)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  415.895883] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  415.924809] SELinux: failed to load policy
03:36:56 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0)

[  416.000006] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  416.018071] SELinux: failed to load policy
03:36:56 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x0)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  416.144860] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  416.199961] SELinux: failed to load policy
03:37:07 executing program 5:
timer_create(0x0, 0x0, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:37:07 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0)

03:37:07 executing program 1:
socket$inet_udp(0x2, 0x2, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r1, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:37:07 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:37:07 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:37:07 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(0xffffffffffffffff, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:37:07 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0)

03:37:08 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(0xffffffffffffffff, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:37:08 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

[  427.413582] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  427.432606] SELinux: failed to load policy
03:37:08 executing program 1:
socket$inet_udp(0x2, 0x2, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r1, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:37:08 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0)

03:37:08 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(0xffffffffffffffff, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  427.548991] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  427.583796] SELinux: failed to load policy
[  427.673238] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  427.725443] SELinux: failed to load policy
03:37:19 executing program 5:
timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:37:19 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed8901807", 0x12)

03:37:19 executing program 1:
socket$inet_udp(0x2, 0x2, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r1, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:37:19 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:37:19 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:37:19 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, 0x0, 0x0, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:37:19 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed8901807", 0x12)

03:37:19 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, 0x0, 0x0, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:37:19 executing program 1:
setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r1, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

[  438.910611] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  438.944410] SELinux: failed to load policy
03:37:19 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:37:19 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed8901807", 0x12)

[  439.039397] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:37:19 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2", 0x1b)

[  439.081806] SELinux: failed to load policy
03:37:30 executing program 5:
timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:37:30 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, 0x0, 0x0, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:37:30 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2", 0x1b)

03:37:30 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:37:30 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:37:30 executing program 1:
setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r1, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:37:31 executing program 1:
setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r1, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:37:31 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2", 0x1b)

03:37:31 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000", 0x18}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:37:31 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:37:31 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c", 0x20)

[  450.496313] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  450.533820] SELinux: failed to load policy
03:37:31 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c", 0x20)

[  450.611199] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  450.635107] SELinux: failed to load policy
03:37:42 executing program 5:
timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:37:42 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c", 0x20)

03:37:42 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:37:42 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:37:42 executing program 1:
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r1, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:37:42 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000", 0x18}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:37:42 executing program 1:
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r1, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:37:42 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000", 0x18}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:37:42 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00ad", 0x22)

[  461.964878] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  461.977171] SELinux: failed to load policy
03:37:42 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00ad", 0x22)

03:37:42 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:37:42 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00ad", 0x22)

[  462.182063] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  462.199748] SELinux: failed to load policy
03:37:54 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:37:54 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', 0x0, 0x0, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:37:54 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00adc2", 0x23)

03:37:54 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:37:54 executing program 1:
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r1, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:37:54 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c91300010001800000", 0x24}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:37:54 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:37:54 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00adc2", 0x23)

03:37:54 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c91300010001800000", 0x24}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

[  473.494994] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:37:54 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', 0x0, 0x0, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  473.548150] SELinux: failed to load policy
03:37:54 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f05bed72fd5e2f59015548c00adc2", 0x23)

03:37:54 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha1\x00'}, 0x58)
r1 = accept4$alg(r0, 0x0, 0x0, 0x0)
sendmmsg(r1, &(0x7f000000a580)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="19cc1a837d75caee5280079475ce7c1d558a0e58bf76e82fac670c05d4e5a2e94145d22e4aeab4d720dedf55baa5a0ae35a7f37b559859c75dd3a38cb4e30f7eaa01525908f8b0f65257627935aa17698688dfc6cff3e0088cafd105ce29bdbb639359721289055d7aaa75f5c5fbaf9cbe59ccf32c69eb0b397899cad19e449baba82c41944f8b0fd4106b2771398f6918616aedc19362b58d943b79cd3f13f5a90352a0b25342dec4", 0xa9}], 0x1}}, {{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001880)="2bb596e7a78653c1354afb8fe84126fbff1e1259ec966297c660065da34addec7fdbc3307d4385337b2f4d8339edf8b1c6e0535ba045d28c7d2c5f7cffed615fa837", 0x42}, {&(0x7f0000000580)="f962f688f77d615f82a7133c88204f8b6d457a4eeec192660062e2e484622c48f4e1b644571c4f62aa0b04dc380f0b62bd95a1ec93704f3da5b3ee7a8c60b23a03be896202bf2cf6fab025c0973519e3ca6b0000000000", 0x57}, {&(0x7f00000019c0)="091e01f0e9a4af447cca88d2f5c96cbd3c7c12bdf070e03512cdc91584cb5536a68577216a7cc9d4fcd267aa1e032d11cb8687231181e6f80d4e06f163db9cc7a47fd991d1e1b1c8979e955eeb314121625885f7769702c2b6fc3acbd0093b41736f0174ade8ef015b40ffb247c3ba69de6ef4cb73b4b4cbab9f593b15847bf16ab1b33e0af3360907bac5bcd820d2f7ad998a7956bd64f616222df138862e5f265121b44a333069bff1de95f7d7ef8ff12adc763e4d155f5ca56c6d352384a39d5776a72f724614e2", 0xc9}], 0x3}}, {{0x0, 0x0, &(0x7f00000030c0)=[{&(0x7f0000002f00)="4d227ce4a471b02e695afa", 0xb}, {&(0x7f0000002f40)="248f26f2edb285acb03fb75a45970c4532f8cabb6d80edd14a17fa16ee5fa28ada4798fd8a5c0eb002f98f377c968934dab026a4b30283cc9e5892cb86978aa839c5ac137dc7c612866a53473cf93a202bedbc75307890ae1d3a47a5ab6159b104636c4c01884eeb4e2d508977a8e8aad39628e364a3015a0c34076e41a0785a41d56482e6bfafa717ae73de81efc0425b4e9175ad135c6057310fe2b94510a66eb74024f07ae5983890fbc6168739b8a0ba0473df", 0xb5}, {&(0x7f0000000600)="3e256126f2efbd23a8f0086b31c68bb40bd90082f43e2835806d6f62ec4a71f6903646a36c2541593d024417d98ee6101525f52ff3cbecd770eff6c3110708cc3cd3d0e69bf5dde834bc43f54f7fd7705a76286e1816c0c83606cc289d33614a84ec42313ba604d23ec2f5ae388f7dee508038a377b889ab25d0cb84aa744e0157cbcd6fa42b6cdd8a594270bc372a42043d8a9ccdb0404bc2b6a9b115e299efae858489f536e534bf1ace5f90e4a85cab4b3b3365", 0xb5}], 0x3}}, {{0x0, 0x0, &(0x7f0000003200)=[{&(0x7f00000031c0)="960bd5a457c76950713c3f237d4afc57c471", 0x12}], 0x1}}, {{0x0, 0x0, &(0x7f0000005600)=[{&(0x7f00000033c0)="4511580a7fd3b61c255137c09f88e00964a727016384fad6d3051f64a130f521f542ccddbe9aa13dceb0", 0x2a}, {&(0x7f0000000400)="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", 0x104}], 0x2}}], 0x5, 0x8000)

[  473.631274] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  473.658258] SELinux: failed to load policy
03:38:05 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:38:05 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', 0x0, 0x0, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:05 executing program 2:
r0 = gettid()
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000))
r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0)
r2 = socket$inet6(0xa, 0x2, 0x0)
read(r1, &(0x7f00000000c0)=""/11, 0xb)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200))
r3 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000240))
epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000140))
close(r2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000)
timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)
tkill(r0, 0x1000000000016)

03:38:05 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:38:05 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:38:05 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c91300010001800000", 0x24}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:38:05 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c91300010001800000500000005867", 0x2a}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:38:05 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

[  485.001140] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:38:05 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x0, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  485.051142] SELinux: failed to load policy
03:38:05 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, 0x0, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:38:05 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c91300010001800000500000005867", 0x2a}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

[  485.128934] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:38:05 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, 0x0, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

[  485.178126] SELinux: failed to load policy
03:38:17 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:38:17 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c91300010001800000500000005867", 0x2a}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:38:17 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, 0x0, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:38:17 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:38:17 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x0, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:17 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="380000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000010f7ab4600000800020000000000"], 0x38}}, 0x0)

03:38:17 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r1, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

[  496.521838] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'.
[  496.539770] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'.
03:38:17 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$alg(0x26, 0x5, 0x0)
ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0)

03:38:17 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a286", 0x2d}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

[  496.564335] SELinux:  policydb magic number 0x70616d73 does not match expected magic number 0xf97cff8c
03:38:17 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x0, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  496.618996] SELinux: failed to load policy
03:38:17 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r1, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:38:17 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
r1 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x8000, 0x0)
ioctl$VIDIOC_TRY_FMT(r1, 0xc040565f, &(0x7f0000000280)={0xa, @pix_mp={0x0, 0x0, 0x4c47504a}})
ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000040)={0x0, "21e0c5224a73be048ee664b52a707b08e5b2e74368b0195e77eb15cb35b3b154", 0x5, 0x2, 0x2, 0x800, 0x1, 0x3, 0x4f})
sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f00000000c0)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
recvmmsg(r0, &(0x7f0000004a40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}}], 0x8000000000003b0, 0x0, 0x0)

[  496.751429] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  496.792717] SELinux: failed to load policy
03:38:28 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:38:28 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a286", 0x2d}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:38:28 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r1, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:38:28 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
r1 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x8000, 0x0)
ioctl$VIDIOC_TRY_FMT(r1, 0xc040565f, &(0x7f0000000280)={0xa, @pix_mp={0x0, 0x0, 0x4c47504a}})
ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000040)={0x0, "21e0c5224a73be048ee664b52a707b08e5b2e74368b0195e77eb15cb35b3b154", 0x5, 0x2, 0x2, 0x800, 0x1, 0x3, 0x4f})
sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f00000000c0)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
recvmmsg(r0, &(0x7f0000004a40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}}], 0x8000000000003b0, 0x0, 0x0)

03:38:28 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:38:28 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x0, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:28 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x0, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:28 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:38:28 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a286", 0x2d}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:38:28 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
r1 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x8000, 0x0)
ioctl$VIDIOC_TRY_FMT(r1, 0xc040565f, &(0x7f0000000280)={0xa, @pix_mp={0x0, 0x0, 0x4c47504a}})
ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000040)={0x0, "21e0c5224a73be048ee664b52a707b08e5b2e74368b0195e77eb15cb35b3b154", 0x5, 0x2, 0x2, 0x800, 0x1, 0x3, 0x4f})
sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f00000000c0)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
recvmmsg(r0, &(0x7f0000004a40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}}], 0x8000000000003b0, 0x0, 0x0)

03:38:28 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663", 0x2e}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:38:28 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

[  508.140787] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  508.175842] SELinux: failed to load policy
03:38:29 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:38:29 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x0, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:29 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663", 0x2e}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:38:29 executing program 2:

03:38:29 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:38:29 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(0x0, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:38:29 executing program 2:

03:38:29 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663", 0x2e}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:38:29 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

[  508.788583] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  508.844609] SELinux: failed to load policy
03:38:29 executing program 2:

03:38:29 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x15, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d"}, 0x15, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:29 executing program 2:

[  509.007119] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  509.032466] SELinux: failed to load policy
03:38:29 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:38:29 executing program 2:

03:38:29 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x15, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d"}, 0x15, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:29 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:38:29 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:38:29 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(0x0, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:38:29 executing program 2:

03:38:29 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:38:29 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

[  509.296278] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:38:29 executing program 2:
r0 = socket(0x2, 0x2, 0x0)
setsockopt$inet_opts(r0, 0x0, 0x15, 0x0, 0x0)

[  509.344732] SELinux: failed to load policy
03:38:30 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r0, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
setsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, 0x0)
r1 = gettid()
tkill(r1, 0x10010000000035)
process_vm_readv(r1, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/217, 0xd9}], 0x1, &(0x7f0000001b00)=[{&(0x7f0000000780)=""/157, 0x9d}], 0x1, 0x0)

03:38:30 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, 0x0, 0x0)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070")
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x251e066, 0x0)

03:38:30 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r0=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r0+30000000}}, 0x0)
r1 = gettid()
tkill(r1, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:38:30 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(0x0, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:38:30 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040))
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:38:30 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

03:38:30 executing program 2:
r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0)
ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000001)
mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x24012, r0, 0x0)
readv(r0, &(0x7f0000000ac0)=[{0x0}, {&(0x7f0000000a40)=""/78, 0x4e}], 0x2)

03:38:30 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x15, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d"}, 0x15, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:30 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040))
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:38:30 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, 0x0)

[  510.205618] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:38:30 executing program 2:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x40000000002)
fcntl$dupfd(r0, 0x0, r0)
r2 = dup3(r1, r0, 0x0)
write$UHID_INPUT(r2, &(0x7f0000000140)={0xd, "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", 0xd00}, 0x1006)

[  510.254880] SELinux: failed to load policy
03:38:30 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x25, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5"}, 0x25, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:30 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070")
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4)
connect$inet(r1, &(0x7f00000000c0), 0x10)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4)
sendmsg$sock(r1, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000000000)="f6", 0x1}], 0x1}, 0x0)
write$binfmt_elf32(r1, &(0x7f0000000300)=ANY=[], 0x10040)
recvmsg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0), 0x5c, 0x0, 0x21f}, 0x142)

03:38:31 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x25, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5"}, 0x25, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  510.381005] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  510.413936] SELinux: failed to load policy
[  510.490920] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  510.507091] SELinux: failed to load policy
[  510.548166] audit: type=1804 audit(2000000311.100:16757): pid=15554 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir127521725/syzkaller.ShSt1i/233/bus" dev="sda1" ino=16864 res=1
03:38:31 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040))
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:38:31 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, 0x0)

03:38:31 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:38:31 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x25, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5"}, 0x25, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:31 executing program 2:

03:38:31 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r0=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r0+30000000}}, 0x0)
r1 = gettid()
tkill(r1, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:38:31 executing program 2:

03:38:31 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, 0x0)

03:38:31 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

[  511.214137] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:38:31 executing program 2:

03:38:31 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x2d, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a2"}, 0x2d, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  511.297953] SELinux: failed to load policy
03:38:31 executing program 2:

03:38:31 executing program 2:

03:38:32 executing program 2:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})

[  511.386816] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  511.418696] SELinux: failed to load policy
03:38:32 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:38:32 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x2d, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a2"}, 0x2d, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  511.604019] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  511.615503] SELinux: failed to load policy
03:38:32 executing program 3:

03:38:32 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:38:32 executing program 2:

03:38:32 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x2d, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a2"}, 0x2d, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:32 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r0=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r0+30000000}}, 0x0)
r1 = gettid()
tkill(r1, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:38:32 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:38:32 executing program 2:

03:38:32 executing program 3:

03:38:32 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:38:32 executing program 2:

[  512.180662] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:38:32 executing program 3:

03:38:32 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x31, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e"}, 0x31, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:32 executing program 2:

03:38:32 executing program 3:

03:38:32 executing program 2:

[  512.347568] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:38:32 executing program 3:

03:38:33 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, 0x0, 0x0)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:38:33 executing program 2:

03:38:33 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:38:33 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x31, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e"}, 0x31, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:33 executing program 3:

03:38:33 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:38:33 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:38:33 executing program 3:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={<r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$jfs(&(0x7f0000000200)='jfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@uid_eq={'uid'}}]})

03:38:33 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10)
r1 = socket(0xa, 0x1, 0x0)
setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88)
setsockopt$inet_mreq(r0, 0x0, 0x22, &(0x7f0000000100)={@loopback, @empty}, 0x8)

03:38:33 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:38:33 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

[  513.059444] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:38:33 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x31, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e"}, 0x31, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:34 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, 0x0, 0x0)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:38:34 executing program 2:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r0)

03:38:34 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:38:34 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:38:34 executing program 3:
syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x8}]})

03:38:34 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x33, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7"}, 0x33, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:34 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:38:34 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

[  513.754348] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  513.790970] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3
03:38:34 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
r1 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x8000, 0x0)
ioctl$VIDIOC_TRY_FMT(r1, 0xc040565f, &(0x7f0000000280)={0xa, @pix_mp={0x0, 0x0, 0x4c47504a}})
ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000040)={0x0, "21e0c5224a73be048ee664b52a707b08e5b2e74368b0195e77eb15cb35b3b154", 0x5, 0x2, 0x0, 0x800, 0x1, 0x3, 0x4f, 0x8001})
recvmmsg(r0, &(0x7f0000004a40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}}], 0x8000000000003b0, 0x0, 0x0)

03:38:34 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

[  513.815253] sel_write_load: 3 callbacks suppressed
[  513.815279] SELinux: failed to load policy
03:38:34 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x33, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7"}, 0x33, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:34 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

[  513.960689] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  513.969588] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3
[  514.006686] SELinux: failed to load policy
03:38:34 executing program 2:
perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101002, 0x0)
ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246)
pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="80", 0x1}], 0x1, 0x0)

03:38:34 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:38:34 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:38:34 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x33, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7"}, 0x33, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:34 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, 0x0, 0x0)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:38:34 executing program 3:
syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x8}]})

03:38:35 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

[  514.405594] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  514.418185] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3
03:38:35 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

[  514.459064] SELinux: failed to load policy
03:38:35 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x34, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de"}, 0x34, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:35 executing program 3:
syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x8}]})

03:38:35 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, 0x0)
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:38:35 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = gettid()
setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r2, 0x0, 0x0)
tkill(r2, 0x10010000000035)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x80000000002c00)

03:38:35 executing program 2:
r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2)
ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x3}, 0xfde1)
syz_open_dev$radio(0x0, 0x3, 0x2)

03:38:35 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080), 0x0)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:38:35 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, 0x0)
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

[  514.657480] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3
03:38:35 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = gettid()
setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r2, 0x0, 0x0)
tkill(r2, 0x10010000000035)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x80000000002c00)

03:38:35 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = gettid()
setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r2, 0x0, 0x0)
tkill(r2, 0x10010000000035)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x80000000002c00)

[  514.727980] SELinux:  policydb magic number 0x70616d73 does not match expected magic number 0xf97cff8c
03:38:35 executing program 3:
syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x8}]})

03:38:35 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, 0x0)
readv(r2, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:38:35 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

[  514.779994] SELinux: failed to load policy
03:38:35 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x34, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de"}, 0x34, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:35 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

[  514.887112] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3
03:38:35 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

[  514.945384] ptrace attach of "/root/syz-executor.4"[15837] was attempted by "/root/syz-executor.4"[15838]
[  514.957327] SELinux:  policydb magic number 0x30343030 does not match expected magic number 0xf97cff8c
03:38:35 executing program 3:
syz_mount_image$reiserfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x8}]})

[  515.015873] SELinux: failed to load policy
03:38:38 executing program 2:
perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0)
ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246)
ppoll(&(0x7f0000000200)=[{r0}, {}], 0x2, &(0x7f0000000180), &(0x7f00000002c0), 0x8)

03:38:38 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:38:38 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080), 0x0)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:38:38 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1)

03:38:38 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x34, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de"}, 0x34, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:38 executing program 3:
syz_mount_image$reiserfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x8}]})

03:38:38 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, 0x0, 0x0)

[  517.645852] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  517.675212] SELinux: failed to load policy
03:38:38 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x0)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  517.717523] ptrace attach of "/root/syz-executor.4"[15877] was attempted by "/root/syz-executor.4"[15879]
03:38:38 executing program 3:
syz_mount_image$reiserfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x8}]})

03:38:38 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

[  517.829518] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  517.848282] SELinux: failed to load policy
03:38:38 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, 0x0, 0x0)

03:38:38 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x0)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  518.037823] SELinux:  policydb magic number 0x70616d73 does not match expected magic number 0xf97cff8c
[  518.061782] ptrace attach of "/root/syz-executor.4"[15908] was attempted by "/root/syz-executor.4"[15910]
[  518.084223] SELinux: failed to load policy
03:38:38 executing program 2:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_open_dev$evdev(0x0, 0x0, 0x0)
pipe(&(0x7f0000000600)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0)
timerfd_create(0x0, 0x0)
r2 = open(0x0, 0x141042, 0x0)
write$UHID_INPUT(r2, &(0x7f0000000580)={0x8, "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", 0x1000}, 0x10000005c)
sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write(r1, &(0x7f00000001c0), 0xfffffef3)
read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3)

03:38:38 executing program 3:
syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x8}]})

03:38:38 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080), 0x0)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:38:38 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, 0x0, 0x0)

03:38:38 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x0)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:38 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
dup2(r0, r0)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r1, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = gettid()
setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r2, 0x0, 0x0)
tkill(r2, 0x10010000000035)
fcntl$setstatus(r1, 0x4, 0x80000000002c00)

03:38:38 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380), 0x0)

[  518.213873] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  518.240660] SELinux: failed to load policy
03:38:38 executing program 3:
syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x8}]})

03:38:38 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(0x0, 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:39 executing program 3:
syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)={[{@jdev={'jdev', 0x3d, './file0'}, 0x8}]})

[  518.499137] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  518.550683] SELinux: failed to load policy
03:38:39 executing program 3:
syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)

03:38:39 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(0x0, 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  518.713490] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  518.748851] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3
03:38:39 executing program 2:
r0 = socket$inet_smc(0x2b, 0x1, 0x0)
setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x482, &(0x7f0000000040)={0x6, @remote, 0x0, 0x0, 'lblcr\x00'}, 0x2c)

03:38:39 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380), 0x0)

03:38:39 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{0x0}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:38:39 executing program 3:
syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)

03:38:39 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = socket(0x10, 0x80002, 0xc)
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x1, 0x6, 0x319}, 0x14}}, 0x0)
sendmmsg$alg(r1, &(0x7f0000000140), 0x492492492492805, 0x0)
ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070")

[  519.047328] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3
03:38:41 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(0x0, 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:41 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380), 0x0)

03:38:41 executing program 2:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
getsockopt$netlink(r0, 0x10e, 0x8000000009, 0x0, &(0x7f0000000040))

03:38:41 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
dup2(r0, r0)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r1, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = gettid()
setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r2, 0x0, 0x0)
tkill(r2, 0x10010000000035)
fcntl$setstatus(r1, 0x4, 0x80000000002c00)

03:38:41 executing program 3:
syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)

03:38:41 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{0x0}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:38:41 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{0x0}], 0x1)

03:38:41 executing program 2:

[  521.248282] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3
[  521.249978] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:38:41 executing program 3:
syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0))

[  521.311619] sel_write_load: 1 callbacks suppressed
[  521.311636] SELinux: failed to load policy
03:38:41 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{0x0}], 0x1)

03:38:41 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:41 executing program 2:

[  521.436930] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3
[  521.473189] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:38:42 executing program 2:

[  521.489138] SELinux: failed to load policy
03:38:42 executing program 3:
syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0))

03:38:42 executing program 2:

[  521.665390] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3
03:38:44 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
dup2(r0, r0)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r1, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = gettid()
setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r2, 0x0, 0x0)
tkill(r2, 0x10010000000035)
fcntl$setstatus(r1, 0x4, 0x80000000002c00)

03:38:44 executing program 2:

03:38:44 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:44 executing program 3:
syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0))

03:38:44 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\')
readv(r2, &(0x7f0000000380)=[{0x0}], 0x1)

03:38:44 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{0x0}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:38:44 executing program 1:

03:38:44 executing program 2:

03:38:44 executing program 2:

[  524.333574] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  524.343130] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3
[  524.369486] SELinux: failed to load policy
03:38:45 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8}, [@ldst={0x6, 0x0, 0x6809}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48)

03:38:45 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='pstore\x00', 0x0, 0x0)

03:38:45 executing program 3:
r0 = socket$inet(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r1=>0xffffffffffffffff})
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
recvmmsg(r0, &(0x7f0000001380), 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400})

[  524.679414] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'.
[  524.705790] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'.
[  524.715121] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'.
[  524.724016] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'.
[  524.743265] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'.
[  524.752779] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'.
[  524.765575] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'.
[  524.777142] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'.
[  524.787306] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'.
[  524.796192] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'.
03:38:47 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r0, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = gettid()
setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r1, 0x0, 0x0)
tkill(r1, 0x10010000000035)
fcntl$setstatus(r0, 0x4, 0x80000000002c00)

03:38:47 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:47 executing program 1:
r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600)
sendfile(r0, r1, 0x0, 0x10000)

03:38:47 executing program 2:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0)
syz_open_procfs(0x0, 0x0)
mlockall(0x3)
chdir(&(0x7f0000000300)='./file0\x00')
ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, 0x0)
poll(&(0x7f0000000200), 0x0, 0x5)

03:38:47 executing program 3:

03:38:47 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, 0x0)
timer_settime(0x0, 0x0, &(0x7f0000000140), 0x0)
r1 = gettid()
tkill(r1, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:38:47 executing program 3:

[  527.327358] audit: type=1804 audit(2000000327.880:16758): pid=16101 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir138443283/syzkaller.LtqYZd/492/file0" dev="sda1" ino=17446 res=1
[  527.363337] SELinux:  policydb magic number 0x70616d73 does not match expected magic number 0xf97cff8c
03:38:47 executing program 3:

[  527.419548] SELinux: failed to load policy
03:38:48 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x0)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:48 executing program 1:

03:38:48 executing program 3:

03:38:48 executing program 1:

[  527.561019] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  527.595935] SELinux: failed to load policy
03:38:50 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r0, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = gettid()
setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r1, 0x0, 0x0)
tkill(r1, 0x10010000000035)
fcntl$setstatus(r0, 0x4, 0x80000000002c00)

03:38:50 executing program 3:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x1000080002, 0x100000000000088)
bind$inet6(r1, &(0x7f0000d85fe4), 0x1c)
setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000003c0)=0x800000001, 0x4)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4)
connect$inet6(r2, &(0x7f0000000140), 0x19)
r3 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00')
sendfile(r2, r3, 0x0, 0xfffc)
r4 = socket$bt_hidp(0x1f, 0x3, 0x6)
ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000180)=0x6367)
sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000210}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="000128bd7000fcdbdf2509000000080006000008000008000400fffeffff080006005bf100000800040004000000586fd7b1e74c"], 0x3}, 0x1, 0x0, 0x0, 0x4020000}, 0x2004004c)
r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x424100, 0x0)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(r5, 0x80045400, &(0x7f0000000080))
accept4$packet(r5, &(0x7f00000007c0)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @local}, 0x0, 0x0)
bind(r0, &(0x7f0000000840)=@can={0x1d, r6}, 0x80)

03:38:50 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1)

03:38:50 executing program 2:
pipe(&(0x7f0000000040)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='!'], 0x1)
r2 = socket$alg(0x26, 0x5, 0x0)
write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0xfffffed5)
bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58)
r3 = accept4(r2, 0x0, 0x0, 0x0)
r4 = accept4$alg(r3, 0x0, 0x0, 0x0)
r5 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r5, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
splice(r0, 0x0, r4, 0x0, 0x1ffffd, 0x0)

03:38:50 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x0)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  530.368875] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  530.389068] SELinux: failed to load policy
03:38:59 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, 0x0)
timer_settime(0x0, 0x0, &(0x7f0000000140), 0x0)
r1 = gettid()
tkill(r1, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:38:59 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x0)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:59 executing program 3:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0)
r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uhid\x00', 0x804, 0x0)
splice(r3, 0x0, r1, 0x0, 0xd, 0x0)

03:38:59 executing program 1:
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xe172, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
keyctl$dh_compute(0x19, 0x0, 0x0, 0x0, 0x0)

03:38:59 executing program 2:
r0 = socket(0x2, 0x8002, 0x0)
connect$unix(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x10)
writev(r0, &(0x7f00000004c0)=[{&(0x7f00000024c0)="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", 0x599}], 0x1)

03:38:59 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r0, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = gettid()
setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r1, 0x0, 0x0)
tkill(r1, 0x10010000000035)
fcntl$setstatus(r0, 0x4, 0x80000000002c00)

03:38:59 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:59 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00D\xde\x9b\x02\x16\a')
r1 = openat$cgroup_ro(r0, &(0x7f0000000200)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x03\x00\x00\x00\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5\xfe\x13\x15\x14\xd7\xb8\xed\xf20\x1e\xc0\xc2\xedz?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7J\xbdX?\xc4\xf4BV\x1744`\xd1@\xb6T\xa6\x81\xb0\xfa\xc4RW\x01\x1f%\xd8\x01\xd0W\xc8\xb09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#\xf7a\xff\xff\xff\xff\xff\xff\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x00\x00\x0e\xa9\x04G*\xd4]\xc3\xcdp\xca+x\x93\xc0g.l\t\r\x1bE\xf3Y\xf0G4\xde\x970]\xa2\xf0\xc4\xb7\x19\xc5xe\xb5\xe2\v\xff\xf8i5I\x89\x9b\xcdZ\xb4\xcd\xa5|\xe2\xca\x88\xf8|\x99\xd09\xb4zc\x90g\xd8\xf1\x05\xefH\xb2\xf8ph\x04\xfb\x9e\x84\x84\x80\x17r\x1a\x88\x8fI\x9c\n\xba\x8c\x9a\x98\xee\xcc\n\x9c\xc2\xea\t\x18\xc8\xfbr\x9e*\xdeE\x80\x10\xd7\xee.\x9c\xed\x81aY:\x95\xd7&\x99\xa5\x80\x05\xec+}mu\x12\x98^\xeb\xfb\x00t?@\x81\x16\xb9\"}\x92k\x81CR\x94\xccIW5\xe6\x98\x9e\xb1\x91\xfe\xbe\xec\x17\x0f\"\xb9(5\x8aZ^\x10({A\x94.\x00\x00\x00\xd3!\x83\x93T\x87n3q\vfPx2+\vd\xdc\xaf\xe0I\x95\x00\xd7\x14U26\x85\xaa\xb5|\x187\xc3f\b\xafg+\xc1%\xd9\xd60\a\f\xb8a\xbb\xf8\x00\xfaat\xb3\xdd\xf3\xd5\x91\x19\xaf+A\xfb', 0x0, 0x0)
lseek(r1, 0x0, 0x3)

[  538.756607] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  538.773159] SELinux: failed to load policy
03:38:59 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
r1 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r1, &(0x7f0000000ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
dup2(r2, r1)

03:38:59 executing program 2:
r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcff47bf070")
ppoll(&(0x7f0000000040)=[{r0}, {r1}, {r1}, {}], 0x4, &(0x7f0000000080), 0x0, 0x0)

[  538.891859] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  538.944009] SELinux: failed to load policy
03:38:59 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:38:59 executing program 1:
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0)
r0 = getpid()
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
r3 = openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0)
kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff, r3, 0x9})
ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0)
ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, 0x0)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0)

[  539.069485] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  539.094874] SELinux: failed to load policy
03:39:10 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, 0x0)
timer_settime(0x0, 0x0, &(0x7f0000000140), 0x0)
r1 = gettid()
tkill(r1, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:39:10 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070")
r1 = socket$kcm(0x10, 0x3, 0x0)
sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0000001d008105e00f80ecdb4cb9f207c804a01c000000ecff06000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0)

03:39:10 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6)

03:39:10 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:39:10 executing program 3:
r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcff47bf070")
ppoll(&(0x7f0000000040)=[{r0}, {r1}, {r1}], 0x3, &(0x7f0000000080), 0x0, 0x0)

03:39:10 executing program 4:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r1, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = gettid()
setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r2, 0x0, 0x0)
tkill(r2, 0x10010000000035)
fcntl$setstatus(r1, 0x4, 0x80000000002c00)

03:39:10 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setaffinity(0x0, 0x8, &(0x7f0000000540)=0x80005)
perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0)
ftruncate(r0, 0x8003f1)
r1 = openat$cgroup_procs(0xffffffffffffff9c, 0x0, 0x2, 0x0)
dup2(r1, r1)
ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000400)={0x0, &(0x7f00000003c0)=""/54})
ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612)
r2 = open(&(0x7f0000000380)='./bus\x00', 0x0, 0x3)
ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000000c0))
ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000007c0)={0x0, 0xffffffff})

03:39:10 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pwrite64(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, &(0x7f0000000180))
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x0)
ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000600)={0x2, 0x0, @ioapic={0xf000, 0x3266, 0xa75d, 0xffffffff, 0x0, [{0xc6c1, 0x6, 0xffff}, {0x0, 0xda, 0x8}, {0x0, 0x0, 0x0, [], 0xe7}, {0x0, 0xffffffff80000001, 0x8, [], 0x100}, {0x8, 0x0, 0x5, [], 0x1a0}, {0x0, 0x6, 0x0, [], 0x5a6}, {}, {0x0, 0xffffffff, 0x6}, {0x0, 0xfffffffffffffc10, 0x0, [], 0x8000}, {}, {0x0, 0x0, 0x1, [], 0x5}, {0x0, 0x0, 0x0, [], 0x7}, {0x400, 0x0, 0x0, [], 0x4}, {0x0, 0x6}, {0x7, 0x0, 0x4}, {0x0, 0x7, 0x4, [], 0x9}, {0x6, 0x0, 0x6, [], 0x80000000000}, {0x20, 0x80000001, 0x0, [], 0x80000000}, {0x0, 0x0, 0x4, [], 0x4}, {0xfffffffffffffffe, 0x0, 0x4}, {0x0, 0x0, 0x0, [], 0x7fff}, {0x0, 0x8, 0xfffffffffffff000, [], 0x7ff}, {0x4, 0x7, 0x0, [], 0xffffffff}, {0x3, 0x5, 0x2}]}})
pipe2(&(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RREADDIR(r2, &(0x7f00000004c0)=ANY=[], 0x0)
openat$random(0xffffffffffffff9c, 0x0, 0x80, 0x0)
r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1)
write$FUSE_STATFS(r3, 0x0, 0x0)
setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f0000000000)=0x9, 0x8)

[  550.282235] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  550.316229] SELinux: failed to load policy
03:39:10 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x10, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  550.389051] audit: type=1804 audit(2000000350.940:16759): pid=16248 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir385522031/syzkaller.VB0vUd/503/bus" dev="sda1" ino=16908 res=1
[  550.472546] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  550.493379] SELinux: failed to load policy
03:39:11 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x10, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:39:11 executing program 1:
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0)
fchown(0xffffffffffffffff, 0x0, 0x0)
syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)

03:39:11 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xe172, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
keyctl$dh_compute(0x18, 0x0, 0x0, 0x0, 0x0)

[  550.672086] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  550.700988] hfsplus: unable to find HFS+ superblock
[  550.704131] SELinux: failed to load policy
[  550.873155] hfsplus: unable to find HFS+ superblock
[  551.233076] audit: type=1804 audit(2000000351.790:16760): pid=16252 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir385522031/syzkaller.VB0vUd/503/bus" dev="sda1" ino=16908 res=1
03:39:22 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180))
timer_settime(0x0, 0x0, 0x0, 0x0)
r1 = gettid()
tkill(r1, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:39:22 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x10, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:39:22 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000140)=0x100000001, 0x4)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c)
r1 = dup2(r0, r0)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000003c0), 0x4)
clock_gettime(0x0, &(0x7f0000000000)={0x0, <r2=>0x0})
clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, r2+10000000}, 0x0)

03:39:22 executing program 3:
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0)
ftruncate(r0, 0x200003)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0)
pipe(&(0x7f00000002c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x100000488)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, 0x0}, 0x0)
openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000440)='/proc/thread-self/attr/current\x00', 0x2, 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

03:39:22 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes-generic)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f255a86d472f9765d7532021179f1ba7", 0x10)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = accept4(r0, 0x0, 0x0, 0x0)
sendmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)='6', 0x1}, {&(0x7f00000001c0)='s', 0x1}], 0x2}, 0x0)

03:39:22 executing program 4:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r1, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = gettid()
setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r2, 0x0, 0x0)
tkill(r2, 0x10010000000035)
fcntl$setstatus(r1, 0x4, 0x80000000002c00)

[  561.817976] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  561.869643] SELinux: failed to load policy
03:39:22 executing program 2:
syz_open_dev$sndtimer(&(0x7f0000000280)='r\x00\x00\x00\x00\x00J\xeb;\xfa\xb6 \x828\x00', 0x0, 0x0)
r0 = memfd_create(&(0x7f0000000040)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpuret.memory_pressure\x00\x8bEY\xd0\x1b\x05\xa2\bG\xdb\xd8\xee\x04=\x17\xae\x89\xbdA\x8a\x1d,v[v1r%\xd8w\x8f\xe7\xcc\n\x93\x06:\xef~\xa7yv\v\xdb\xc62e\xe3\x00%\xa4-\xdb\x8a1\x9c\x89\xf3\xbd\x8aW\xd9\xa3<d\xd2g\xd5\xbe\x80', 0x275a, 0x0)
r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x40)
fallocate(r1, 0x0, 0x0, 0x2000002)
read$eventfd(r1, &(0x7f00000003c0), 0x8)
fallocate(r0, 0x800000000000002, 0x6, 0x2)
r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0)
r3 = socket$inet6(0xa, 0x400000000001, 0x0)
r4 = dup(r3)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3)
setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4)
bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = open(&(0x7f0000000440)='./bus\x00', 0xa00, 0x140)
ftruncate(r2, 0x800fe)
getresuid(&(0x7f0000004840), 0x0, &(0x7f00000048c0))
sendfile(r4, r5, 0x0, 0x8000fffffffe)

03:39:22 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r1 = socket$inet6(0xa, 0x401000000001, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r0, 0x10, &(0x7f0000000340))
r3 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r4 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r3, r4, 0x0, 0x88201)
sendmmsg(r3, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r5 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r5, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, 0xffffffffffffffff, 0x0)
sendfile(r1, r5, 0x0, 0x8000fffffffe)
r6 = accept(r5, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r6, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r7, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  562.017852] audit: type=1804 audit(2000000362.560:16761): pid=16308 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir385522031/syzkaller.VB0vUd/505/bus" dev="sda1" ino=16920 res=1
[  562.142546] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  562.178847] SELinux: failed to load policy
03:39:22 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r1 = socket$inet6(0xa, 0x401000000001, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r0, 0x10, &(0x7f0000000340))
r3 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r4 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r3, r4, 0x0, 0x88201)
sendmmsg(r3, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r5 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r5, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, 0xffffffffffffffff, 0x0)
sendfile(r1, r5, 0x0, 0x8000fffffffe)
r6 = accept(r5, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r6, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r7, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:39:22 executing program 2:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$RTC_WKALM_RD(r0, 0x80287010, 0x0)

[  562.381528] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:39:23 executing program 2:
r0 = msgget$private(0x0, 0x0)
msgsnd(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="02"], 0x1, 0x0)
msgrcv(r0, 0x0, 0x0, 0x3, 0x0)
msgrcv(r0, 0xfffffffffffffffe, 0xffffffffffffff90, 0x2, 0x800)

[  562.432296] SELinux: failed to load policy
03:39:23 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r1 = socket$inet6(0xa, 0x401000000001, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r0, 0x10, &(0x7f0000000340))
r3 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r4 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r3, r4, 0x0, 0x88201)
sendmmsg(r3, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r5 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r5, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, 0xffffffffffffffff, 0x0)
sendfile(r1, r5, 0x0, 0x8000fffffffe)
r6 = accept(r5, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r6, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r7, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  562.619642] audit: type=1400 audit(2000000363.170:16762): avc:  denied  { map } for  pid=16284 comm="syz-executor.3" path="pipe:[62797]" dev="pipefs" ino=62797 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1
[  562.681540] audit: type=1400 audit(2000000363.170:16763): avc:  denied  { execute } for  pid=16284 comm="syz-executor.3" path="pipe:[62797]" dev="pipefs" ino=62797 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1
03:39:33 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180))
timer_settime(0x0, 0x0, 0x0, 0x0)
r1 = gettid()
tkill(r1, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:39:33 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
socket$inet6(0xa, 0x401000000001, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r3 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r4 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r3, r4, 0x0, 0x88201)
sendmmsg(r3, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r5 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r5, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(0xffffffffffffffff, r5, 0x0, 0x8000fffffffe)
r6 = accept(r5, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r6, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r7, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:39:33 executing program 3:
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0)
ftruncate(r0, 0x200003)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0)
pipe(&(0x7f00000002c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f0000000340), 0x100000488)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, 0x0}, 0x0)
openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000440)='/proc/thread-self/attr/current\x00', 0x2, 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

03:39:33 executing program 1:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
poll(&(0x7f0000000000)=[{r0, 0x160}], 0x1, 0x606dca73)
preadv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000001640)=""/247, 0xffffffcc}], 0x10000221, 0x0)
r2 = open(&(0x7f00000002c0)='./file0\x00', 0x611, 0x0)
pwritev(r2, &(0x7f00000003c0), 0x273, 0x0)
mmap(&(0x7f0000000000/0x10000)=nil, 0x10000, 0x2, 0x10, r2, 0x0)
dup2(r1, r0)

03:39:33 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setaffinity(0x0, 0x8, &(0x7f0000000540)=0x80005)
perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0)
ftruncate(r0, 0x8003f1)
r1 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000000)='tasks\x00', 0x2, 0x0)
dup2(r1, r1)
ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000400)={0x0, &(0x7f00000003c0)=""/54})
openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rfkill\x00', 0x40, 0x0)
r2 = open(&(0x7f0000000380)='./bus\x00', 0x0, 0x3)
ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000000c0))
ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000007c0)={0x0, 0xffffffff})

03:39:33 executing program 4:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r1, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = gettid()
setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r2, 0x0, 0x0)
tkill(r2, 0x10010000000035)
fcntl$setstatus(r1, 0x4, 0x80000000002c00)

03:39:33 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
socket$inet6(0xa, 0x401000000001, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r3 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r4 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r3, r4, 0x0, 0x88201)
sendmmsg(r3, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r5 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r5, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(0xffffffffffffffff, r5, 0x0, 0x8000fffffffe)
r6 = accept(r5, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r6, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r7, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  573.317476] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  573.333421] SELinux: failed to load policy
[  573.382830] audit: type=1804 audit(2000000373.940:16764): pid=16349 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir385522031/syzkaller.VB0vUd/508/bus" dev="sda1" ino=16937 res=1
[  573.422817] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  573.458323] SELinux: failed to load policy
03:39:34 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
socket$inet6(0xa, 0x401000000001, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r3 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r4 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r3, r4, 0x0, 0x88201)
sendmmsg(r3, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r5 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r5, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(0xffffffffffffffff, r5, 0x0, 0x8000fffffffe)
r6 = accept(r5, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r6, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r7, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  573.619119] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  573.659151] SELinux: failed to load policy
03:39:34 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  573.794429] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  573.814359] SELinux: failed to load policy
03:39:34 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  573.936189] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  573.955718] SELinux: failed to load policy
03:39:34 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000fffffffe)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  574.088736] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  574.109119] SELinux: failed to load policy
03:39:34 executing program 1:
io_setup(0x80400000000002, &(0x7f00000000c0)=<r0=>0x0)
io_getevents(r0, 0x8, 0x80000000000024d, &(0x7f0000000400)=[{}, {}], 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
recvmmsg(0xffffffffffffff9c, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000c40)=""/23, 0x17}], 0x1, 0x0, 0x0, 0x8}}], 0x1, 0x0, 0x0)
sched_setaffinity(0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00')
preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000)

[  574.273071] audit: type=1804 audit(2000000374.830:16765): pid=16349 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir385522031/syzkaller.VB0vUd/508/bus" dev="sda1" ino=16937 res=1
[  574.325986] audit: type=1804 audit(2000000374.880:16766): pid=16359 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir385522031/syzkaller.VB0vUd/508/bus" dev="sda1" ino=16937 res=1
03:39:45 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180))
timer_settime(0x0, 0x0, 0x0, 0x0)
r1 = gettid()
tkill(r1, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:39:45 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x0)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:39:45 executing program 3:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x12000000013, &(0x7f0000d06000)=0x1, 0x4)
connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x6a)
setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000180)=0x80000000001, 0x4)
r1 = fcntl$dupfd(r0, 0x0, r0)
write$P9_RREMOVE(r1, &(0x7f0000000000)={0x7}, 0x7)
recvmmsg(r0, &(0x7f00000001c0), 0x315, 0xea225aec34b1dd0e, 0x0)
ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0)
inotify_add_watch(0xffffffffffffffff, 0x0, 0x0)
ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0)

03:39:45 executing program 2:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='mountinfo\x00')
socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0)
setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0)
pipe(&(0x7f0000000680)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f0000000340), 0x41395527)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200), 0x0)
vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0)

03:39:45 executing program 1:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x1000080002, 0x100000000000088)
bind$inet6(r1, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c)
r2 = socket$inet6(0xa, 0x802, 0x88)
setsockopt$inet6_udp_int(r2, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4)
connect$inet6(r3, &(0x7f0000000140), 0x19)
r4 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00')
sendfile(r3, r4, 0x0, 0xfffc)
ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x6367)
sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000210}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4020000}, 0x2004004c)
r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x424100, 0x0)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000080))
accept4$packet(r5, &(0x7f00000007c0)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000800)=0x14, 0x800)
bind(r0, &(0x7f0000000840)=@can={0x1d, r6}, 0x80)

03:39:45 executing program 4:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:39:45 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x0)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  584.836682] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  584.866291] SELinux: failed to load policy
03:39:45 executing program 1:
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000840)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @broadcast}})

03:39:45 executing program 3:
perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x2, 0x0)
recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000c40)=[{0x0}, {0x0}], 0x2}, 0x0)
shutdown(r0, 0x0)

[  584.983028] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  585.001269] SELinux: failed to load policy
03:39:45 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x0)
r7 = accept(r6, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  585.030134] protocol 88fb is buggy, dev hsr_slave_0
[  585.035277] protocol 88fb is buggy, dev hsr_slave_1
03:39:45 executing program 1:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff820004000000000ed08691ff9dc01"], 0x2c)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)

[  585.113726] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  585.124178] SELinux: failed to load policy
03:39:45 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(0xffffffffffffffff, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  585.159223] SELinux: ebitmap: truncated map
[  585.163947] SELinux: failed to load policy
[  585.350181] protocol 88fb is buggy, dev hsr_slave_0
[  585.355344] protocol 88fb is buggy, dev hsr_slave_1
03:39:56 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180))
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, 0x0}}, 0x0)
r1 = gettid()
tkill(r1, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:39:56 executing program 1:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000a40))

03:39:56 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(0xffffffffffffffff, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:39:56 executing program 3:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000008000)={0x4, {{0x2, 0x0, @multicast1}}}, 0x88)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
mprotect(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x4)
getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000), &(0x7f0000000080)=0x2e5)

03:39:56 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x40, 0x4)
sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020f000102000000477363b4a2023b08"], 0x10}}, 0x0)
recvmmsg(r0, &(0x7f0000000f00), 0x400000000000308, 0x10000, &(0x7f0000001000)={0x77359400})

03:39:56 executing program 4:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:39:56 executing program 3:
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x120003, @random="5473f684b6e3", 'ip6_vti0\x00'}}, 0x1e)
r1 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @local, 'erspan0\x00'}}, 0x1e)
ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x3, @local, 'ip6_vti0\x00'}})

03:39:56 executing program 1:
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x100003, @local, 'ip6_vti0\x00'}}, 0x1e)
r1 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @dev={[], 0x1f}, 'erspan0\x00'}}, 0x1e)
ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x3, @local, 'ip6_vti0\x00'}})

[  596.366516] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:39:57 executing program 2:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
pipe(0x0)
pipe(&(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
dup2(r0, 0xffffffffffffffff)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
pipe(0x0)
pipe(0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
accept4$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x24}]}, &(0x7f00000000c0)='GPL\x02', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)

03:39:57 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(0xffffffffffffffff, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  596.411983] SELinux: failed to load policy
03:39:57 executing program 3:
r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600)
sendfile(r0, r1, 0x0, 0x10000)
syz_open_dev$loop(0x0, 0x0, 0x0)

03:39:57 executing program 1:
r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x4, 0x0)
ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0)

[  596.538033] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  596.565159] audit: type=1804 audit(2000000397.120:16767): pid=16482 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir282542072/syzkaller.JZVAl7/304/file0" dev="sda1" ino=16935 res=1
[  596.608493] SELinux: failed to load policy
03:40:08 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180))
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, 0x0}}, 0x0)
r1 = gettid()
tkill(r1, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:40:08 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070")
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)

03:40:08 executing program 3:
perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$packet(0x11, 0x3, 0x300)
socket$inet6(0xa, 0x1000000000002, 0x0)
r0 = socket$inet6(0xa, 0x3, 0x84)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c)
sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffedd, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000000)={0x0, <r1=>0x0})
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0)

03:40:08 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:40:08 executing program 2:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070")
sendfile(r1, r1, 0x0, 0x7)

03:40:08 executing program 4:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:40:08 executing program 2:
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x3, 0x2}, 0x10)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000100), 0x0}, 0x18)

03:40:08 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000002980)=[{&(0x7f0000001400)=""/116, 0x74}], 0x1, 0x0)
setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080)=0xaa, 0x1)
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00')
preadv(r0, &(0x7f00000017c0), 0x132, 0x0)

[  607.896806] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  607.910130] protocol 88fb is buggy, dev hsr_slave_0
[  607.915252] protocol 88fb is buggy, dev hsr_slave_1
[  607.967945] SELinux: failed to load policy
03:40:08 executing program 2:
r0 = socket$inet(0x2, 0x3, 0x19)
connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x12)
setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@dev}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8)
setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x18)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
dup3(r1, r0, 0x0)

03:40:08 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  608.230145] protocol 88fb is buggy, dev hsr_slave_0
[  608.235270] protocol 88fb is buggy, dev hsr_slave_1
03:40:08 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

[  608.379318] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  608.403407] SELinux: failed to load policy
03:40:09 executing program 3:
clock_gettime(0x0, 0x0)
pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0), 0x8})
r0 = gettid()
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000))
shmget$private(0x0, 0x3000, 0x0, &(0x7f0000e7f000/0x3000)=nil)
timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0)
socketpair(0x0, 0x0, 0x0, 0x0)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200))
openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0)
keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, 0x0, 0x0, 0x0)
tkill(r0, 0x15)

03:40:19 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180))
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, 0x0}}, 0x0)
r1 = gettid()
tkill(r1, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:40:19 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:40:19 executing program 1:
process_vm_readv(0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000400)=""/185, 0xb9}], 0x5, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070")
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4)
connect$inet(r1, &(0x7f00000000c0), 0x10)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4)
sendmsg$sock(r1, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000000000)="f6", 0x1}], 0x1}, 0x0)
write$binfmt_elf32(r1, &(0x7f0000000300)=ANY=[], 0x10040)
recvmsg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0), 0x5c, 0x0, 0x21f}, 0x142)

03:40:19 executing program 3:
syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00')
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0)
ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1})
write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil})
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
accept4(0xffffffffffffffff, &(0x7f00000006c0)=@tipc=@name, &(0x7f0000000440)=0x80, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYRES16=0x0, @ANYBLOB="ffc797"], 0x2}}, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$KVM_NMI(r2, 0xae9a)
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380))
ioctl$KVM_RUN(r2, 0xae80, 0x0)

03:40:19 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:40:19 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, 0x0)
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r1, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = gettid()
setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r2, 0x0, 0x0)
tkill(r2, 0x10010000000035)
fcntl$setstatus(r1, 0x4, 0x80000000002c00)

03:40:20 executing program 1:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/6, 0x6}], 0x1)

[  619.418780] SELinux:  policydb magic number 0x70616d73 does not match expected magic number 0xf97cff8c
03:40:20 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, 0x0)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  619.468307] SELinux: failed to load policy
03:40:20 executing program 1:
syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x4000000000802, 0x0)
write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c)
ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2)
ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8)
ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1)
ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0)
r1 = syz_open_dev$mice(0x0, 0x0, 0x0)
dup3(r0, r1, 0x0)
ioctl$UI_DEV_DESTROY(r1, 0x5502)

03:40:20 executing program 3:
clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0)
dup(r1)
wait4(0x0, 0x0, 0x80000000, 0x0)
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="347e8da95a96e4f0cd80"], 0xa}}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x37)
pipe2(&(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r2})
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  619.549368] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  619.595461] SELinux: failed to load policy
03:40:20 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, 0x0)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  619.619980] input: syz1 as /devices/virtual/input/input33
03:40:20 executing program 3:
recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0)
syz_open_procfs(0x0, &(0x7f0000000100)='net/packet\x00')
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
sched_setaffinity(0x0, 0xffad, &(0x7f0000000c40)=0x5)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xc)
r0 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r1=>0x0, <r2=>0x0}, &(0x7f0000cab000)=0xc)
chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0)
lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x2, r2}, {0x8, 0x0, r2}]}, 0x34, 0x0)
chdir(&(0x7f0000000340)='./file0\x00')
symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00')
clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0)
setxattr$trusted_overlay_origin(&(0x7f0000000180)='./bus\x00', 0x0, 0x0, 0x0, 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0))
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000))
r3 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0)
socket(0x10, 0x0, 0x0)
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000007c0)={'syz1', "c264e951bf1cc8052dc75f"}, 0xf)
quotactl(0xa980, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000280)="96a2")

[  619.722314] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  619.739206] SELinux: failed to load policy
[  619.886384] input: syz1 as /devices/virtual/input/input34
03:40:31 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
gettid()
tkill(0x0, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:40:31 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, 0x0)
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:40:31 executing program 3:
socket$inet6_udp(0xa, 0x2, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)

03:40:31 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
r1 = socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, 0x0)
sendmsg$nl_netfilter(r1, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000001060501ffb080fffd4500120000090008000100060000fb7d0a17010c000200030001ff06f14b52"], 0x2c}}, 0x0)

03:40:31 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:40:31 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, 0x0)
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r1, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = gettid()
setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r2, 0x0, 0x0)
tkill(r2, 0x10010000000035)
fcntl$setstatus(r1, 0x4, 0x80000000002c00)

03:40:31 executing program 3:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet(0x10, 0x2, 0x0)
sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="240000004a0007041dfffd946f6105000a0080001f00000000000800080006000400ff7e", 0x24}], 0x1}, 0x0)

[  630.917294] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  630.925413] nla_parse: 20 callbacks suppressed
[  630.925420] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'.
[  630.935602] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'.
03:40:31 executing program 1:
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6_sctp(0xa, 0x5, 0x84)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, 0x0, 0x0)
openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c)
r2 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x4}, 0x4)
r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00')
sendfile(r0, r3, 0x0, 0xedc0)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[], &(0x7f000095dffc))
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)

03:40:31 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r7, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  630.983264] SELinux: failed to load policy
03:40:31 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a205721400aafc43ad34248ffeed89018071d052f", 0x15)

[  631.092156] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  631.103570] syz-executor.1 (16632) used greatest stack depth: 23504 bytes left
[  631.128418] SELinux: failed to load policy
03:40:31 executing program 1:
r0 = socket$netlink(0x10, 0x3, 0x6)
perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$nl_generic(r0, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000600)={0x14, 0x1c, 0x1a1}, 0x14}}, 0x0)
ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0)
ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, 0x0)

03:40:31 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r7, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  631.262589] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  631.273410] SELinux: failed to load policy
03:40:32 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
gettid()
tkill(0x0, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:40:32 executing program 3:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r2 = dup2(r0, r0)
sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYRES32], 0x1}}, 0x0)
shutdown(r0, 0x1)

03:40:32 executing program 1:
socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r0, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20)
setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4)
connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c)
setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000240)=@dstopts, 0x8)
setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000000c0)=@dstopts, 0x8)
sendmsg(r3, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[{0xc}], 0xc}, 0x0)

03:40:32 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r7, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:40:32 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

[  631.790942] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  631.811115] SELinux: failed to load policy
03:40:34 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, 0x0)
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r1, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = gettid()
setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r2, 0x0, 0x0)
tkill(r2, 0x10010000000035)
fcntl$setstatus(r1, 0x4, 0x80000000002c00)

03:40:34 executing program 1:
perf_event_open(&(0x7f0000000200)={0x0, 0xfffffffffffffd93, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0)
poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0)
r1 = dup(0xffffffffffffffff)
ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x3, 0x1aa8000000})
openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00')
preadv(0xffffffffffffffff, &(0x7f0000000100), 0x174, 0x4000006800)
recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, 0x0, 0x0)
write$sndseq(r3, 0x0, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0)
r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)
r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r5, 0xae80, 0x0)

03:40:34 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, 0x0)
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:40:34 executing program 3:
r0 = msgget$private(0x0, 0x0)
msgrcv(r0, 0x0, 0x0, 0x0, 0x0)
msgsnd(r0, &(0x7f0000000040), 0x4, 0x0)

03:40:34 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
gettid()
tkill(0x0, 0x1000000000016)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r2, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:40:34 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:40:34 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

[  633.931550] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  633.961651] SELinux: failed to load policy
03:40:34 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, 0x0)
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:40:34 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

[  634.073881] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  634.095739] SELinux: failed to load policy
03:40:34 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, 0x0)
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:40:34 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:40:34 executing program 1:
perf_event_open(&(0x7f0000000200)={0x0, 0xfffffffffffffd93, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0)
poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0)
r1 = dup(0xffffffffffffffff)
ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x3, 0x1aa8000000})
openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00')
preadv(0xffffffffffffffff, &(0x7f0000000100), 0x174, 0x4000006800)
recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, 0x0, 0x0)
write$sndseq(r3, 0x0, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0)
r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)
r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r5, 0xae80, 0x0)

[  634.281726] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  634.310786] SELinux: failed to load policy
03:40:37 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(0xffffffffffffffff, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:40:37 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:40:37 executing program 1:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='veno\x00', 0x5)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x7ff8, 0x32, 0x0, 0x27)

03:40:37 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x0, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:40:37 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:40:37 executing program 3:
clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x38)
socket$inet_udplite(0x2, 0x2, 0x88)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
open$dir(0x0, 0x0, 0x0)
mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0)
linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$cont(0x7, r0, 0x0, 0x5)

03:40:37 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x3000, 0x2000, &(0x7f0000000000/0x2000)=nil})

03:40:37 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

[  636.979167] SELinux:  policydb magic number 0x70616d73 does not match expected magic number 0xf97cff8c
[  637.003664] ptrace attach of "/root/syz-executor.3"[16732] was attempted by "/root/syz-executor.3"[16734]
03:40:37 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x0, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:40:37 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000002980)=[{&(0x7f0000001400)=""/116, 0x74}], 0x1, 0x0)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x400080, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00')
preadv(r0, &(0x7f00000017c0), 0x148, 0x0)

[  637.025586] SELinux: failed to load policy
03:40:37 executing program 1:
perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c)
socket$inet6(0xa, 0x1000000000002, 0x0)
socket$inet6(0xa, 0x3, 0x84)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0)

03:40:37 executing program 2:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:40:40 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(0xffffffffffffffff, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:40:40 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x0, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:40:40 executing program 2:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:40:40 executing program 3:
r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2)
ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1)

03:40:40 executing program 1:
syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0)
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x4000000000802, 0x0)
write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c)
ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1)
ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0)
r1 = syz_open_dev$mice(0x0, 0x0, 0x0)
dup3(r0, r1, 0x0)
ioctl$UI_DEV_DESTROY(r1, 0x5502)

03:40:40 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:40:40 executing program 2:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

[  640.024284] input: syz1 as /devices/virtual/input/input35
[  640.049203] SELinux:  policydb magic number 0x70616d73 does not match expected magic number 0xf97cff8c
[  640.088881] SELinux: failed to load policy
03:40:40 executing program 2:
mkdir(0x0, 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:40:40 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:40:40 executing program 2:
mkdir(0x0, 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

[  640.229666] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  640.242579] SELinux: failed to load policy
03:40:40 executing program 1:
perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)

03:40:40 executing program 2:
mkdir(0x0, 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:40:43 executing program 1:
openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
pipe2(0x0, 0xffe21e66ec54393b)
ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0)
openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = memfd_create(0x0, 0x0)
pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0)
r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0)
ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)=0x20008088)
write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0x8db9)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000fffffffe)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, 0x0)
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, r2)
fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', r2, 0xffffffffffffffff, 0x1000)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000)

03:40:43 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(0xffffffffffffffff, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:40:43 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:40:43 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:40:43 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:40:43 executing program 3:
r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2)
ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1)

03:40:43 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:40:43 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  643.067550] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  643.092214] SELinux: failed to load policy
03:40:43 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:40:43 executing program 1:
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x100003, @local, 'ip6_vti0\x00'}}, 0x1e)
r1 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @remote, 'erspan0\x00'}}, 0x1e)
ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x3, @local, 'ip6_vti0\x00'}})

[  643.186283] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:40:43 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x0, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  643.242906] SELinux: failed to load policy
03:40:43 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070")
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4)
connect$inet(r1, &(0x7f00000000c0), 0x10)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4)
sendmsg$sock(r1, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000000000)="f6", 0x1}], 0x1}, 0x0)
write$binfmt_elf32(r1, &(0x7f0000000300)=ANY=[], 0x10040)
recvmsg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0), 0x41, 0x0, 0x21f}, 0x142)

03:40:43 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

[  643.338534] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  643.356841] SELinux: failed to load policy
03:40:43 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x0, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  643.476103] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  643.491818] SELinux: failed to load policy
03:40:46 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:40:46 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:40:46 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = socket(0x200000000000011, 0x4000000000080002, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00\x00\x00\x00\x00\x00\xad\x00', <r2=>0x0})
bind$packet(r1, &(0x7f0000000080)={0x11, 0x3, r2, 0x1, 0x0, 0x6, @link_local}, 0x14)
sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0)

03:40:46 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x0, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:40:46 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
socket$inet_udp(0x2, 0x2, 0x0)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:40:46 executing program 3:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0)
ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'})
ioctl$UI_DEV_CREATE(r0, 0x5501)
ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0)

03:40:46 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

[  646.106492] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  646.133885] input: syz0 as /devices/virtual/input/input37
[  646.147006] SELinux: failed to load policy
03:40:46 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x0, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  646.215157] input: syz0 as /devices/virtual/input/input38
03:40:46 executing program 1:
r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x6, 0x0)
write$UHID_CREATE2(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000080f882dccab370b227c3c9139f8ec7144f651bedff8afafce2d93041b54c5a85307abcca720d2cd28c12a628ea1dd314d8edc7e1fa5f96f4498be5bd459bb3655167cafab09cd86fa63829"], 0x119)
socket$inet(0x2, 0x0, 0x0)
write$UHID_INPUT2(r0, &(0x7f00000000c0)={0xc, 0xfffffe13, "7ebe4b7e8026cc1b5c8dc6b4b5981449cb107fc3b450f42b3d02dad28afee06eb579801e88e7ee6242243968f442c19580cc0e19c9ff18c46be1168327ff3f593c40a144c4e8f96ca894d28d54"}, 0x26c)

03:40:46 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@newlink={0x50, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINK_NETNSID={0x8}, @IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x50}}, 0x0)

[  646.296285] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:40:46 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

[  646.336632] SELinux: failed to load policy
03:40:46 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x0, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  646.374752] hid-generic 0000:0000:0000.0001: hidraw0: <UNKNOWN> HID v0.00 Device [syz0] on syz1
[  646.478988] hid-generic 0000:0000:0000.0002: hidraw0: <UNKNOWN> HID v0.00 Device [syz0] on syz1
[  646.573309] SELinux:  policydb magic number 0x70616d73 does not match expected magic number 0xf97cff8c
[  646.604953] SELinux: failed to load policy
03:40:49 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:40:49 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4)
connect$inet(r0, &(0x7f00000000c0), 0x10)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4)
sendmsg$sock(r0, &(0x7f0000002280)={0x0, 0x0, 0x0}, 0x600c0031)

03:40:49 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:40:49 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:40:49 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x0, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:40:49 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
socket$inet_udp(0x2, 0x2, 0x0)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:40:49 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:40:49 executing program 1:
perf_event_open(&(0x7f0000000680)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
lsetxattr(&(0x7f0000fc0000)='./file1\x00', &(0x7f0000000000)=@known='user./yz\xff', &(0x7f0000fc0000)='//selinux\x00\x00\x01\x01', 0x19a, 0x0)

03:40:49 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:40:49 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  649.120561] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  649.142160] SELinux: failed to load policy
03:40:49 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:40:49 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  649.261003] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  649.279466] SELinux: failed to load policy
[  649.403526] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  649.421456] SELinux: failed to load policy
03:40:52 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:40:52 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:40:52 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:40:52 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:40:52 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:40:52 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
socket$inet_udp(0x2, 0x2, 0x0)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:40:52 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

[  652.163029] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  652.177234] SELinux: failed to load policy
03:40:52 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:40:52 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:40:52 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:40:52 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:40:53 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:40:55 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r1, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = gettid()
setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r2, 0x0, 0x0)
tkill(r2, 0x10010000000035)
fcntl$setstatus(r1, 0x4, 0x80000000002c00)

03:40:55 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:40:55 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:40:55 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:40:55 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:40:55 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x0, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:40:55 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:40:55 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:40:55 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

[  655.258050] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  655.298893] SELinux: failed to load policy
03:40:55 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:40:55 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:40:56 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:40:58 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r1, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = gettid()
setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r2, 0x0, 0x0)
tkill(r2, 0x10010000000035)
fcntl$setstatus(r1, 0x4, 0x80000000002c00)

03:40:58 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:40:58 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:40:58 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:40:58 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  658.283386] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  658.324405] SELinux: failed to load policy
03:41:07 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x0, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:41:07 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:07 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:07 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0)
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:41:07 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:41:07 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r1, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = gettid()
setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r2, 0x0, 0x0)
tkill(r2, 0x10010000000035)
fcntl$setstatus(r1, 0x4, 0x80000000002c00)

03:41:07 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:07 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:07 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0)
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

[  666.782563] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  666.809539] SELinux: failed to load policy
03:41:07 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:41:07 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0)
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

[  666.929004] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  666.944908] SELinux: failed to load policy
03:41:07 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  667.026485] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  667.067089] SELinux: failed to load policy
03:41:08 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x0, &(0x7f0000000140)="11dca50d5e0bcfe47bf070")

03:41:08 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:08 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:08 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
openat$cgroup_int(r8, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:41:08 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, 0x0, &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

[  667.639399] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  667.654293] SELinux: failed to load policy
03:41:10 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:10 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:10 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:10 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:41:10 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, 0x0)

03:41:10 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, 0x0, &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:41:10 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:10 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

[  669.783279] SELinux:  policydb string SE Lin5x does not match my string SE Linux
03:41:10 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

[  669.833677] SELinux: failed to load policy
03:41:10 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

03:41:10 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage\x00', 0x2, 0x0)

[  669.937417] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  669.949983] SELinux: failed to load policy
03:41:10 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

[  670.038415] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  670.063082] SELinux: failed to load policy
03:41:13 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:13 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:13 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:13 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, 0x0, 0x2, 0x0)

03:41:13 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, 0x0, &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)

03:41:13 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, 0x0)

03:41:13 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:13 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

[  672.836872] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  672.866863] SELinux: failed to load policy
03:41:13 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, 0x0, 0x2, 0x0)

[  672.966946] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  672.982782] SELinux: failed to load policy
03:41:13 executing program 0:
bind$inet(0xffffffffffffffff, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e357812000000e1e71640afc000c46f000600"], 0x20)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00')
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast1}, &(0x7f0000000040)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000000340))
r4 = socket$inet6(0xa, 0x100800000000002, 0x0)
connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00')
sendfile(r4, r5, 0x0, 0x88201)
sendmmsg(r4, &(0x7f0000005780), 0x4000000000000d2, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x35, 0x8, 0x86fb, "11e1ae1059a7c8e3a2cbda3af918cd5d", "f6c603dc05baddfbe6b4b629f0046ff5b975254a3e66f5a210a10d3e0da7de39"}, 0x35, 0x5)
r6 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0)
ftruncate(r6, 0x2007fff)
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0)
sendfile(r2, r6, 0x0, 0x8000fffffffe)
r7 = accept(r6, 0x0, &(0x7f0000000100))
ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @multicast1}, {0x49cda442873617c6}, 0x4, {0x2, 0x4e20, @multicast1}, 'veth1_to_hsr\x00'})
creat(&(0x7f0000000140)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0)
openat$cgroup_int(r8, 0x0, 0x2, 0x0)

03:41:13 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:13 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

[  673.116742] SELinux:  policydb string SE Lin5x does not match my string SE Linux
[  673.188888] SELinux: failed to load policy
03:41:16 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:16 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:16 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:16 executing program 0:
r0 = socket(0x20000000000000a, 0x2, 0x0)
getsockopt$sock_buf(r0, 0x1, 0x29, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0)
madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008)

03:41:16 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0)

03:41:16 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, 0x0)

03:41:16 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:16 executing program 0:
r0 = socket(0x20000000000000a, 0x2, 0x0)
getsockopt$sock_buf(r0, 0x1, 0x29, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0)
madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008)

03:41:16 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:16 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:16 executing program 0:
sched_setaffinity(0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)

03:41:16 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:16 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:16 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:16 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:16 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:17 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0)

03:41:17 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140))

03:41:17 executing program 0:
pipe(&(0x7f0000000300)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x30005, 0x0)

03:41:17 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:17 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:17 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:17 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:17 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:17 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:17 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:17 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:17 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040))
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:18 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0)

03:41:18 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140))

03:41:18 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:18 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:18 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040))
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:18 executing program 0:
perf_event_open(&(0x7f0000000680)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs(0x0, &(0x7f0000272000))

03:41:18 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040))
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:18 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040))
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:18 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:18 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040))
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:18 executing program 0:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$vsock_stream(0x28, 0x1, 0x0)
connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @reserved}, 0x10)
listen(r0, 0x0)
accept(r0, 0x0, 0x0)

03:41:18 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:18 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040))
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:18 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140))

03:41:21 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, 0x0, 0x0)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:21 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:21 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x2001000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070")
socket$packet(0x11, 0x0, 0x300)
syz_emit_ethernet(0xc0, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x2}}}}}, 0x0)
shmget(0x3, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil)

03:41:21 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:21 executing program 0:
syz_init_net_socket$bt_hci(0x1f, 0x6, 0x1)

03:41:21 executing program 0:
r0 = gettid()
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="0c700f057717c51d05df86e7cc93047ebdfecb56c6f67678023b279c16596c98"], 0x20}}, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
ptrace$setopts(0x4206, r1, 0x0, 0x0)
tkill(r0, 0x38)
capget(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x3})
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r1, 0x0, 0x0)

03:41:21 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, 0x0, 0x0)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:21 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:21 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:21 executing program 2:
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0)
chdir(&(0x7f00000000c0)='./file0\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00<s\x8c\')tU\x19\x9a)S\xa7b\xce\xd8\xde\x95\xf6\xc3\\n\xc1\xa2)o\xee\x97\xdf\xe9\xf3\xfdJ\xe8`7iY\x86~\xd8\xecy\xc00.\x90\xfc\xac\xa0\xb8\x1d\x1a\x7f\xec\xea\np\xb4\xd5l\xb5\xc3\xc7w%\x16a~]P\x04\xc7 \xf7\x92\x8b\x8f\x9d&\\\xf9\xa3\x96G<\xd4\x80\x16/\x81\xe7(\x8b\xde9]\xaf\xbc\xb0\r}Ne\xfaX\xb0\x8a\xbd\x1d\xfc\xd4\x91\x95\x00\v\x14a0_\xd9\x1f\xc7\xb5\xc3FS\x16\x03~\xbbc*\xa3\xab`\x06\xf0\xbc\xacJY\xe7\xb2\x8cw\xa4U.\xa4\xe2u\x1d!jVL}#O\t\xb2`\x0e\xe9\xc6*\xf7\xf8Uh\x8e\x01\xf1b\xf5;\x8a\x17\x9a\x0fq\x01\x91pSR\x82-H\n\x1fP\xb6*\xc9\xfd\x89\xb5\x7f\x87m\"\xaa\xce\xed\a\xf2\xfd<\x10\xb8\xcf\xfac\xcc\x0f\xd2\xdd\xcd#8\"\x8b\xf2\xccA\v\xdf\xf5\x8d\xa5-\x02\xaa|\xdd\xd0az\xc8,)\xedf\x89x>\a\x13', 0x275a, 0x0)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0)
mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffa000/0x1000)=nil)

03:41:21 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, 0x0, 0x0)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

[  680.658156] ptrace attach of "/root/syz-executor.0"[17404] was attempted by "/root/syz-executor.0"[17407]
[  680.713421] x86/PAT: syz-executor.2:17411 freeing invalid memtype [mem 0x00000000-0x00000fff]
[  680.714536] audit: type=1400 audit(2000000481.270:16768): avc:  denied  { map } for  pid=17409 comm="syz-executor.2" path="/root/syzkaller-testdir385522031/syzkaller.VB0vUd/559/file0/mem" dev="devtmpfs" ino=13676 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:memory_device_t:s0 tclass=chr_file permissive=1
[  680.725894] x86/PAT: syz-executor.2:17415 freeing invalid memtype [mem 0x00002000-0x00002fff]
03:41:30 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0b")

03:41:30 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:30 executing program 0:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x28f}, {0x0}, {0x0, 0xfffffffffffffe99}, {&(0x7f0000000380)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db7", 0x24}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r1=>0xffffffffffffffff})
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

03:41:30 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:30 executing program 2:
r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10)
sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0)
sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="853a26980112"}, 0x80)

03:41:30 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:30 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:30 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:30 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:30 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:30 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:30 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:31 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0b")

03:41:31 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:33 executing program 0:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_type(r1, &(0x7f0000000000)='threaded\xa0', 0x4004)

03:41:33 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:33 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:33 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:33 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
fcntl$setstatus(r1, 0x4, 0x800)
recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, 0x0}, 0x40000)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0)
mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, 0x0)
splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0xa312, 0x0)
keyctl$get_persistent(0x16, r2, 0x0)
sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="2407000002000000040000a4"], 0xc}}, 0x0)
close(r0)

03:41:33 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0b")

03:41:33 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:33 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:33 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:33 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, 0x0, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:33 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup\x00', 0x200002, 0x0)
pipe(&(0x7f0000000880)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
write(r2, &(0x7f00000001c0), 0xfffffef3)
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0xaa, 0x0)
fchdir(r0)
creat(&(0x7f0000000140)='./bus\x00', 0x1df3361da0516029)
getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, 0x0, 0x0)
ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0)
r3 = creat(&(0x7f00000000c0)='./file1\x00', 0x0)
openat$selinux_context(0xffffffffffffff9c, 0x0, 0x2, 0x0)
ioctl$FS_IOC_RESVSP(r3, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a})
write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0)
write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0)
syz_emit_ethernet(0x0, 0x0, 0x0)
fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0)
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, 0x0)
ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0)

03:41:33 executing program 1:
socket$inet_tcp(0x2, 0x1, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:33 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:33 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
fcntl$setstatus(r1, 0x4, 0x800)
recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, 0x0}, 0x40000)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0)
mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, 0x0)
splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0xa312, 0x0)
keyctl$get_persistent(0x16, r2, 0x0)
sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="2407000002000000040000a4"], 0xc}}, 0x0)
close(r0)

03:41:33 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, 0x0, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:33 executing program 1:
socket$inet_tcp(0x2, 0x1, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:33 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:34 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47b")

03:41:34 executing program 1:
socket$inet_tcp(0x2, 0x1, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})

03:41:34 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:34 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
fcntl$setstatus(r1, 0x4, 0x800)
recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, 0x0}, 0x40000)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0)
mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, 0x0)
splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0xa312, 0x0)
keyctl$get_persistent(0x16, r2, 0x0)
sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="2407000002000000040000a4"], 0xc}}, 0x0)
close(r0)

03:41:34 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0)

03:41:34 executing program 0:
r0 = socket$key(0xf, 0x3, 0x2)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
fcntl$setstatus(r1, 0x4, 0x800)
recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, 0x0}, 0x40000)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0)
mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, 0x0)
splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0xa312, 0x0)
keyctl$get_persistent(0x16, r2, 0x0)
sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="2407000002000000040000a4"], 0xc}}, 0x0)
close(r0)

03:41:34 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:34 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0)

[  693.860536] device bridge_slave_1 left promiscuous mode
[  693.866102] bridge0: port 2(bridge_slave_1) entered disabled state
[  693.943829] device bridge_slave_0 left promiscuous mode
[  693.949682] bridge0: port 1(bridge_slave_0) entered disabled state
[  693.998836] IPv6: addrconf: prefix option has invalid lifetime
03:41:34 executing program 0:
prlimit64(0x0, 0x0, &(0x7f0000000000)={0x0, 0xfffffbfffffffffc}, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000000)

[  694.072694] device hsr_slave_1 left promiscuous mode
[  694.833937] device hsr_slave_0 left promiscuous mode
[  694.899268] team0 (unregistering): Port device team_slave_1 removed
[  694.937040] team0 (unregistering): Port device team_slave_0 removed
[  694.966909] bond0 (unregistering): Releasing backup interface bond_slave_1
[  695.024672] bond0 (unregistering): Releasing backup interface bond_slave_0
[  695.104364] bond0 (unregistering): Released all slaves
03:41:36 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, 0x0, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:36 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0)

03:41:36 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:36 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47b")

03:41:36 executing program 0:
r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00')
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20}, 0x10)
listen(r1, 0x0)
sendfile(r0, r0, 0x0, 0x1008147c)

03:41:36 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

[  696.871520] IPVS: ftp: loaded support on port[0] = 21
[  697.881487] chnl_net:caif_netlink_parms(): no params data found
[  697.921731] bridge0: port 1(bridge_slave_0) entered blocking state
[  697.928189] bridge0: port 1(bridge_slave_0) entered disabled state
[  697.937632] device bridge_slave_0 entered promiscuous mode
[  697.944285] bridge0: port 2(bridge_slave_1) entered blocking state
[  697.951428] bridge0: port 2(bridge_slave_1) entered disabled state
[  697.958208] device bridge_slave_1 entered promiscuous mode
[  697.974689] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  697.983422] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  698.006202] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  698.013408] team0: Port device team_slave_0 added
[  698.018717] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  698.025852] team0: Port device team_slave_1 added
[  698.031150] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  698.038365] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  698.092585] device hsr_slave_0 entered promiscuous mode
[  698.130339] device hsr_slave_1 entered promiscuous mode
[  698.170461] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  698.179629] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  698.191392] bridge0: port 2(bridge_slave_1) entered blocking state
[  698.197830] bridge0: port 2(bridge_slave_1) entered forwarding state
[  698.204460] bridge0: port 1(bridge_slave_0) entered blocking state
[  698.211226] bridge0: port 1(bridge_slave_0) entered forwarding state
[  698.239236] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  698.245511] 8021q: adding VLAN 0 to HW filter on device bond0
[  698.254441] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  698.262788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  698.269830] bridge0: port 1(bridge_slave_0) entered disabled state
[  698.287624] bridge0: port 2(bridge_slave_1) entered disabled state
[  698.299453] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  698.305703] 8021q: adding VLAN 0 to HW filter on device team0
[  698.313733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  698.321378] bridge0: port 1(bridge_slave_0) entered blocking state
[  698.327714] bridge0: port 1(bridge_slave_0) entered forwarding state
[  698.351209] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  698.358736] bridge0: port 2(bridge_slave_1) entered blocking state
[  698.365106] bridge0: port 2(bridge_slave_1) entered forwarding state
[  698.372559] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  698.380644] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  698.388070] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  698.395417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  698.403252] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  698.416571] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  698.422700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  698.435588] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  698.445611] 8021q: adding VLAN 0 to HW filter on device batadv0
[  698.581462] device bridge_slave_1 left promiscuous mode
[  698.586962] bridge0: port 2(bridge_slave_1) entered disabled state
[  698.644895] device bridge_slave_0 left promiscuous mode
[  698.650656] bridge0: port 1(bridge_slave_0) entered disabled state
[  698.672911] IPv6: addrconf: prefix option has invalid lifetime
03:41:39 executing program 2:
capset(&(0x7f0000000080)={0x24020019980330}, &(0x7f0000000040))
r0 = inotify_init1(0x0)
socket$inet6(0xa, 0x1000000000002, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0)
setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, <r1=>0x0})
get_robust_list(r1, 0x0, 0x0)

03:41:39 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:39 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:39 executing program 1:
socket$nl_route(0x10, 0x3, 0x0)
ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0)
r0 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0)
write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfffffffffffffd3c)
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
socket$unix(0x1, 0x0, 0x0)
r1 = gettid()
getdents(r0, 0x0, 0xfffffffffffffe2a)
getdents(r0, &(0x7f0000000240)=""/172, 0xac)
prctl$PR_CAPBSET_DROP(0x18, 0x0)
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0)
timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0)
gettid()
tkill(r1, 0x5000000000016)
sched_getparam(0xffffffffffffffff, 0x0)
prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0)

03:41:39 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47b")

[  698.755473] device hsr_slave_1 left promiscuous mode
03:41:39 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff)
mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0)
mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0)
r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000640), 0x12)

[  698.812765] device hsr_slave_0 left promiscuous mode
[  698.855110] team0 (unregistering): Port device team_slave_1 removed
[  698.867279] team0 (unregistering): Port device team_slave_0 removed
[  698.877983] bond0 (unregistering): Releasing backup interface bond_slave_1
[  698.924620] bond0 (unregistering): Releasing backup interface bond_slave_0
[  698.993006] bond0 (unregistering): Released all slaves
03:41:39 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:39 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:39 executing program 1:
sched_setaffinity(0x0, 0xfffffffffffffff5, &(0x7f0000000000)=0x5)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)

03:41:39 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4)
unshare(0x20600)
connect$inet(r0, &(0x7f00000000c0), 0x10)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4)
sendmsg$sock(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000000000)="f6", 0x1}], 0x1}, 0x0)
recvmsg(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0), 0x5c, 0x0, 0x21f}, 0x142)

[  699.053602] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[  700.781365] IPVS: ftp: loaded support on port[0] = 21
[  701.629415] chnl_net:caif_netlink_parms(): no params data found
[  701.666243] bridge0: port 1(bridge_slave_0) entered blocking state
[  701.672783] bridge0: port 1(bridge_slave_0) entered disabled state
[  701.679836] device bridge_slave_0 entered promiscuous mode
[  701.686468] bridge0: port 2(bridge_slave_1) entered blocking state
[  701.692935] bridge0: port 2(bridge_slave_1) entered disabled state
[  701.699775] device bridge_slave_1 entered promiscuous mode
[  701.721690] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  701.730680] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  701.750894] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  701.758044] team0: Port device team_slave_0 added
[  701.763507] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  701.770734] team0: Port device team_slave_1 added
[  701.775841] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  701.783850] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  701.852109] device hsr_slave_0 entered promiscuous mode
[  701.890325] device hsr_slave_1 entered promiscuous mode
[  701.930488] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  701.939595] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  701.953038] bridge0: port 2(bridge_slave_1) entered blocking state
[  701.959415] bridge0: port 2(bridge_slave_1) entered forwarding state
[  701.966101] bridge0: port 1(bridge_slave_0) entered blocking state
[  701.972485] bridge0: port 1(bridge_slave_0) entered forwarding state
[  702.002296] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  702.008398] 8021q: adding VLAN 0 to HW filter on device bond0
[  702.018838] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  702.027300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  702.034338] bridge0: port 1(bridge_slave_0) entered disabled state
[  702.041584] bridge0: port 2(bridge_slave_1) entered disabled state
[  702.051318] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  702.057478] 8021q: adding VLAN 0 to HW filter on device team0
[  702.069348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  702.077450] bridge0: port 1(bridge_slave_0) entered blocking state
[  702.083827] bridge0: port 1(bridge_slave_0) entered forwarding state
[  702.101350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  702.109217] bridge0: port 2(bridge_slave_1) entered blocking state
[  702.115593] bridge0: port 2(bridge_slave_1) entered forwarding state
[  702.123124] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  702.130830] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  702.138252] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  702.145931] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  702.149519] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  702.163598] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  702.169612] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  702.179568] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  702.192584] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  702.202088] 8021q: adding VLAN 0 to HW filter on device batadv0
[  702.290418] device bridge_slave_1 left promiscuous mode
[  702.296110] bridge0: port 2(bridge_slave_1) entered disabled state
03:41:42 executing program 0:
openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x303000, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0)
openat$dir(0xffffffffffffff9c, 0x0, 0x24080, 0x13)
keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f00000001c0)=""/210, 0xd2)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8)
getpgid(0xffffffffffffffff)
perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000000, 0x0, 0x3f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clock_settime(0x0, &(0x7f0000000000)={0x77359400})
capset(&(0x7f0000000600)={0x39980732}, 0x0)
mkdir(&(0x7f0000000640)='.\x00', 0x11)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0)
gettid()
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000002c0)="22ae1b179ca83213139df0a560aec0fefdca1065f628ab5361a9aec44b8c8a172ddfc83315cb861e79375ee3f02bfec935174b9b621a845c985b11f239b0afb0d7f9108013d5110d667ba02ca03899350d5f527b25fad799ab3700c3f54dc8ac0b8a662f2fa4e6f32884f41c83e1d2abffd31f4be07f8f2b95db133c8e754e8b00776ce4cebacdc30800549098b0ab52d805e5577021ebcd8dbd0d024adb773a8cf2efd12971274a53b449dced2550c89ea29ef9cc775e395e349045b9349423309e6ee7ff6202f677fa01847b2a3834838e028ce3d53283665d4f19435690894a29a18bfc4415c478a2e2a798238c231a", 0xffffffffffffff55}], 0x198}, 0x0)
r2 = socket$inet(0x10, 0x3, 0x0)
fcntl$setpipe(r0, 0x407, 0x8)
gettid()
add_key$keyring(&(0x7f0000000c80)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r1)
socketpair(0x14, 0x1, 0x9, &(0x7f0000000440)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r3, 0x10e, 0x8, &(0x7f0000000480)=0x80, 0x4)
getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000008c0), &(0x7f0000000900)=0x8)
add_key(&(0x7f0000000540)='t\xe1wg\x80\x80\xbd\x8b\x00\x01\x10~\x8f\x05@ud\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000680)="7d432b3a7c01d429d7e004b469f34641d367ae1c94592853c0c2049541a8bce17dd979b936668b26d15c45ef6fd4b8b1d9eff43a53673e603310e64cfe1a5a00"/75, 0x5, r1)
r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb)
keyctl$unlink(0x9, r4, 0xfffffffffffffffd)

03:41:42 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:41:42 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, 0x0, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:41:42 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)

03:41:42 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb)
setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6)
bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10)
setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000005c0)={0x2, {{0x2, 0x4e20, @multicast2}}, 0x1, 0x3, [{{0x2, 0x0, @remote}}, {{0x2, 0x4e24, @local}}, {{0x2, 0x4e22, @loopback}}]}, 0x20c)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21}, 0x10)
r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xffffffff, 0x280)
bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha512-ssse3,ecb-twofish-avx)\x00'}, 0x58)
accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x80000)
lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='trusted.overlay.origin\x00', &(0x7f0000000200)=""/1, 0x1)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000040), 0x4)
ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0)
ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, 0x0)
setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0)
write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0)
getpgid(0xffffffffffffffff)
sched_setaffinity(0x0, 0x0, 0x0)
sendto$inet(r0, &(0x7f0000000580)='\x00', 0x1, 0x0, 0x0, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x4, 0x7ffffffc}, 0x14)
shutdown(r0, 0x1)

03:41:42 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf0")

[  702.340846] device bridge_slave_0 left promiscuous mode
[  702.346379] bridge0: port 1(bridge_slave_0) entered disabled state
[  702.532620] device hsr_slave_1 left promiscuous mode
[  702.573320] device hsr_slave_0 left promiscuous mode
[  702.633196] team0 (unregistering): Port device team_slave_1 removed
[  702.655059] team0 (unregistering): Port device team_slave_0 removed
[  702.679612] bond0 (unregistering): Releasing backup interface bond_slave_1
[  702.734695] bond0 (unregistering): Releasing backup interface bond_slave_0
[  702.852211] bond0 (unregistering): Released all slaves
03:33:20 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:33:20 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xf, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8}, [@ldst={0x6, 0x0, 0x6809}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48)

03:33:20 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

[  702.915867] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
03:33:20 executing program 1:
pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0), 0x8})
r0 = gettid()
timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000))
timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200))
tkill(r0, 0x15)

03:33:20 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:33:20 executing program 0:
r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='3\t'], 0x4)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

03:33:20 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0)

03:33:20 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0)

[  704.420869] IPVS: ftp: loaded support on port[0] = 21
[  705.307835] chnl_net:caif_netlink_parms(): no params data found
[  705.341400] bridge0: port 1(bridge_slave_0) entered blocking state
[  705.347933] bridge0: port 1(bridge_slave_0) entered disabled state
03:33:22 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, 0x0, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

[  705.355135] device bridge_slave_0 entered promiscuous mode
[  705.362137] bridge0: port 2(bridge_slave_1) entered blocking state
[  705.368603] bridge0: port 2(bridge_slave_1) entered disabled state
[  705.375815] device bridge_slave_1 entered promiscuous mode
[  705.399477] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  705.408610] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  705.428419] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  705.435932] team0: Port device team_slave_0 added
[  705.441533] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  705.448700] team0: Port device team_slave_1 added
[  705.454032] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  705.464382] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  705.522236] device hsr_slave_0 entered promiscuous mode
[  705.570522] device hsr_slave_1 entered promiscuous mode
[  705.610764] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  705.617679] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  705.629574] bridge0: port 2(bridge_slave_1) entered blocking state
[  705.636133] bridge0: port 2(bridge_slave_1) entered forwarding state
[  705.642780] bridge0: port 1(bridge_slave_0) entered blocking state
[  705.649114] bridge0: port 1(bridge_slave_0) entered forwarding state
[  705.675060] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  705.681552] 8021q: adding VLAN 0 to HW filter on device bond0
[  705.689125] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  705.697351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  705.705263] bridge0: port 1(bridge_slave_0) entered disabled state
[  705.712047] bridge0: port 2(bridge_slave_1) entered disabled state
[  705.721570] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  705.727635] 8021q: adding VLAN 0 to HW filter on device team0
[  705.736866] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  705.744462] bridge0: port 1(bridge_slave_0) entered blocking state
[  705.750838] bridge0: port 1(bridge_slave_0) entered forwarding state
[  705.759554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  705.767666] bridge0: port 2(bridge_slave_1) entered blocking state
[  705.774052] bridge0: port 2(bridge_slave_1) entered forwarding state
[  705.792375] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  705.799917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  705.807587] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  705.815502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  705.823516] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  705.834036] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  705.840083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  705.852160] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  705.861902] 8021q: adding VLAN 0 to HW filter on device batadv0
[  706.300428] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
03:33:24 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={<r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$vsock_dgram(0x28, 0x2, 0x0)
getpeername(r2, 0x0, 0x0)

03:33:24 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000))
r1 = socket(0x10, 0x200080002, 0x0)
sendmmsg$alg(r1, 0x0, 0x0, 0x0)
getpeername$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc)
sendmsg$nl_route(r1, &(0x7f0000000400)={&(0x7f00000000c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0xb485ee2a231ce7d}, 0x0)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000140)="9d", 0x0}, 0x18)

03:33:24 executing program 0:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000))
socket$packet(0x11, 0x0, 0x300)
pipe(&(0x7f0000000300)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
inotify_init1(0x0)
fcntl$setpipe(r2, 0x407, 0x0)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10)
connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10)
splice(r1, 0x0, r3, 0x0, 0x30005, 0x0)

03:33:24 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0)

03:33:24 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf0")

03:33:24 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, 0x0, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:33:24 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:33:24 executing program 2:
perf_event_open(&(0x7f0000000680)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8)

03:33:24 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00'})

03:33:24 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000))
r1 = socket(0x10, 0x200080002, 0x0)
sendmmsg$alg(r1, 0x0, 0x0, 0x0)
getpeername$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc)
sendmsg$nl_route(r1, &(0x7f0000000400)={&(0x7f00000000c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0xb485ee2a231ce7d}, 0x0)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000140)="9d", 0x0}, 0x18)

03:33:24 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0)
accept4(r0, 0x0, 0x0, 0x800)
socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00')

03:33:24 executing program 2:
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0)
syz_open_dev$usbmon(0x0, 0x0, 0x0)
openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x5, @dev={[], 0x1c}, 'bridge0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f000000d180), 0x33b, 0x0)
ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0)
msgget$private(0x0, 0x0)
bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0)
ioprio_get$pid(0x0, 0x0)
write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0)

03:33:24 executing program 1:
accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket$packet(0x11, 0x3, 0x300)
getrusage(0x1, &(0x7f0000000140))
memfd_create(0x0, 0x0)
pipe(&(0x7f0000000340)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
write(r2, &(0x7f00000001c0), 0xfffffef3)
ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f00000001c0)={'yam0\x00', {0x2, 0x4e23, @remote}})
sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0)
r3 = accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000e80), 0x180000)
lseek(r3, 0x0, 0x4)
getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000400)=ANY=[@ANYBLOB="105cdcf349fa0209000000d2403368a108384df8c0de42cd0327542ebf0eefd2b449207a41af6c80b7ab0bd40071f2929418bde6c508eae4a0bb237dc153436b3ff9804fea6366ef010001001eebfc6477be5a35a800001a903bd5740acc791e6876ae0e1cf00e165f0ec6369332b8e583370344eeab0fbd25c0f7e2c53fd71e0c9fdc6fcb610f6cc5b83943967b3aa08acde78f1881200b40220d65e88668ec2640ae8889f60711f3c4936d6a10687c2b57db73727eee9b9eb014988581"], 0x0)
read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3)
inotify_init()
clone(0x100020040004104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x0, 0x0)
mkdir(0x0, 0x0)
ioctl$TCSETXF(r2, 0x5434, &(0x7f00000000c0)={0x80, 0x0, [0x6095, 0x97, 0x8, 0xfff, 0x9], 0x5})
mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, 0x0)
clone(0x2000001, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r4 = getpid()
wait4(r4, 0x0, 0x0, 0x0)
r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0)
pipe(&(0x7f0000000200)={<r6=>0xffffffffffffffff, <r7=>0xffffffffffffffff})
write(r7, &(0x7f00000001c0), 0xfffffef3)
vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fchdir(r5)
ioctl$UI_SET_RELBIT(r6, 0x40045566, 0x5)

03:33:24 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00'})

[  707.510148] protocol 88fb is buggy, dev hsr_slave_0
[  707.515303] protocol 88fb is buggy, dev hsr_slave_1
03:33:24 executing program 0:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000))
socket$packet(0x11, 0x0, 0x300)
pipe(&(0x7f0000000300)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
inotify_init1(0x0)
fcntl$setpipe(r2, 0x407, 0x0)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10)
connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10)
splice(r1, 0x0, r3, 0x0, 0x30005, 0x0)

03:33:24 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:33:24 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'})
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00'})

03:33:24 executing program 5:
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0)
readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1)
clock_gettime(0x0, &(0x7f0000000180)={0x0, <r1=>0x0})
timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, r1+30000000}}, 0x0)
r2 = gettid()
tkill(r2, 0x1000000000016)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf0")

[  707.812023] IPVS: ftp: loaded support on port[0] = 21
03:33:24 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000002980)=[{&(0x7f0000001400)=""/116, 0x74}], 0x1, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00')
preadv(r0, &(0x7f00000017c0), 0x132, 0x0)

03:33:25 executing program 3:
pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0), 0x8})
r0 = gettid()
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000))
shmget$private(0x0, 0x3000, 0x0, &(0x7f0000e7f000/0x3000)=nil)
timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0)
socketpair(0x0, 0x0, 0x0, 0x0)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200))
keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, 0x0, 0x0, 0x0)
tkill(r0, 0x15)

03:33:25 executing program 2:
syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00')
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0)
ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1})
write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil})
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
accept4(0xffffffffffffffff, &(0x7f00000006c0)=@tipc=@name, &(0x7f0000000440)=0x80, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$KVM_NMI(r2, 0xae9a)
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380))
ioctl$KVM_RUN(r2, 0xae80, 0x0)

[  708.080596] protocol 88fb is buggy, dev hsr_slave_0
[  708.085726] protocol 88fb is buggy, dev hsr_slave_1
03:33:25 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:33:25 executing program 3:
syz_emit_ethernet(0x6a, &(0x7f00000002c0)=ANY=[@ANYBLOB="ffffffffffff020000ff000008004500005c0000000000019078ac7014bbac1414110502907800000600400000000000000000210000ac14540dac141400082c00000000000000000000e000000200000000e0009fbe007f0000010000000000000000"], 0x0)
ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000040))
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0)
socket$alg(0x26, 0x5, 0x0)
socket$alg(0x26, 0x5, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000001c0)={0x1, 0x7e, 0x0, 0x6}, 0x10)
socket$inet6(0xa, 0x9, 0x7fc)
perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, 0x0, 0xed41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x13a62}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000680)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs(0x0, &(0x7f0000272000))
sched_setaffinity(0x0, 0x8, &(0x7f0000000300)=0x6)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffdc1)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x422, &(0x7f00000003c0)="11dca5963f3e010d16d10d5e0bcfe47bf070")
getsockname$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f00000001c0)=0x10)
clock_gettime(0x0, &(0x7f0000000000))
lsetxattr(&(0x7f0000fc0000)='./file1\x00', &(0x7f0000000000)=@known='user./yz\xff', &(0x7f0000fc0000)='//selinux\x00\x00\x01\x01', 0x19a, 0x0)
ioctl(r1, 0x10000, &(0x7f0000000140)="153f6234488dd25d766070")
socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={<r3=>0xffffffffffffffff})
r4 = socket(0x11, 0x3, 0x8)
r5 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0xfff, 0x111600)
ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000800)=<r6=>0x0)
ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f0000000440)=r6)
ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x10})
syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2)

03:33:25 executing program 2:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4004e24, 0x0, @loopback}, 0x1c)
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9)
sendmmsg(r0, &(0x7f00000092c0), 0x800010b, 0x18)
fcntl$getown(0xffffffffffffffff, 0x9)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0))

[  708.312583] protocol 88fb is buggy, dev hsr_slave_0
[  708.318291] protocol 88fb is buggy, dev hsr_slave_1
[  708.454456] bridge0: port 3(team0) entered blocking state
[  708.460258] bridge0: port 3(team0) entered disabled state
[  708.467159] device team0 entered promiscuous mode
[  708.470147] protocol 88fb is buggy, dev hsr_slave_0
[  708.474444] device team_slave_0 entered promiscuous mode
[  708.477242] protocol 88fb is buggy, dev hsr_slave_1
[  708.483837] device team_slave_1 entered promiscuous mode
03:33:25 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:33:25 executing program 1:
r0 = socket$inet_smc(0x2b, 0x1, 0x0)
setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x483, &(0x7f0000000040)={0x6, @remote, 0x0, 0x0, 'lblcr\x00'}, 0x2c)

[  708.505503] bridge0: port 3(team0) entered blocking state
[  708.511174] bridge0: port 3(team0) entered forwarding state
03:33:25 executing program 0:
clock_gettime(0x0, 0x0)
pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0), 0x8})
r0 = gettid()
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000))
shmget$private(0x0, 0x3000, 0x0, &(0x7f0000e7f000/0x3000)=nil)
timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0)
socketpair(0x0, 0x0, 0x0, 0x0)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200))
tkill(r0, 0x15)

03:33:25 executing program 2:
open(&(0x7f00000000c0)='./file0\x00', 0x80040, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
mount$overlay(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='overlay\x00', 0x0, &(0x7f00000003c0)={[{@default_permissions='default_permissions'}]})

03:33:25 executing program 1:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', <r1=>0x0})
bind$can_raw(r0, &(0x7f0000004f40)={0x1d, r1}, 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="e1affde3", 0x4)
bind$can_raw(r0, &(0x7f0000000080), 0x10)

[  708.748489] overlayfs: missing 'lowerdir'
[  708.800255] protocol 88fb is buggy, dev hsr_slave_0
[  708.805397] protocol 88fb is buggy, dev hsr_slave_1
[  712.630210] net_ratelimit: 20 callbacks suppressed
[  712.630215] protocol 88fb is buggy, dev hsr_slave_0
[  712.640410] protocol 88fb is buggy, dev hsr_slave_1
[  712.950164] protocol 88fb is buggy, dev hsr_slave_0
[  712.955371] protocol 88fb is buggy, dev hsr_slave_1
[  713.430328] protocol 88fb is buggy, dev hsr_slave_0
[  713.435466] protocol 88fb is buggy, dev hsr_slave_1
[  713.750181] protocol 88fb is buggy, dev hsr_slave_0
[  713.755346] protocol 88fb is buggy, dev hsr_slave_1
[  714.310167] protocol 88fb is buggy, dev hsr_slave_0
[  714.315239] protocol 88fb is buggy, dev hsr_slave_1
[  717.910206] net_ratelimit: 20 callbacks suppressed
[  717.910212] protocol 88fb is buggy, dev hsr_slave_0
[  717.920366] protocol 88fb is buggy, dev hsr_slave_1
[  718.470162] protocol 88fb is buggy, dev hsr_slave_0
[  718.475302] protocol 88fb is buggy, dev hsr_slave_1
[  718.710174] protocol 88fb is buggy, dev hsr_slave_0
[  718.715264] protocol 88fb is buggy, dev hsr_slave_1
[  718.870180] protocol 88fb is buggy, dev hsr_slave_0
[  718.875291] protocol 88fb is buggy, dev hsr_slave_1
03:33:36 executing program 0:
perf_event_open(&(0x7f0000000680)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs(0x0, &(0x7f0000000240)='fd/4\x00')

03:33:36 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
unlinkat(0xffffffffffffffff, 0x0, 0x200)

03:33:36 executing program 3:
r0 = socket$isdn_base(0x22, 0x3, 0x0)
ioctl$IMGETDEVINFO(r0, 0x80044944, &(0x7f00000039c0))

03:33:36 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:33:36 executing program 1:
perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c)
socket$inet6(0xa, 0x1000000000002, 0x0)
r0 = socket$inet6(0xa, 0x3, 0x84)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c)
sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffedd, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000000)={0x0, <r1=>0x0})
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0)

03:33:36 executing program 2:
r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0)
write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='\"! \t'], 0x4)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  719.190802] protocol 88fb is buggy, dev hsr_slave_0
[  719.195861] protocol 88fb is buggy, dev hsr_slave_1
03:33:36 executing program 3:
r0 = socket$isdn_base(0x22, 0x3, 0x0)
ioctl$IMGETDEVINFO(r0, 0x80044944, &(0x7f00000039c0))

03:33:36 executing program 5:
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0)
mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1020, &(0x7f0000000500)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}})

03:33:36 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070")
bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha256\x00'}, 0x58)

03:33:36 executing program 0:
perf_event_open(&(0x7f0000000680)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x4001, 0x0)

03:33:36 executing program 3:
openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x6, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
clone(0x4001400, 0x0, &(0x7f0000000080), 0x0, 0x0)
inotify_init1(0x0)
pipe(&(0x7f00000004c0))
clock_gettime(0x0, &(0x7f0000000240)={0x0, <r1=>0x0})
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0)

[  719.332196] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev ramfs, type ramfs) errno=-22
03:33:36 executing program 2:
perf_event_open(&(0x7f0000000680)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff)

[  719.414392] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev ramfs, type ramfs) errno=-22
03:33:36 executing program 3:
socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r0, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000240)=@dstopts, 0x8)
setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000000c0)=@dstopts, 0x8)

03:33:36 executing program 0:
socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r0, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000240)=@dstopts, 0x8)
setsockopt$inet6_opts(r3, 0x29, 0x3b, 0x0, 0x0)

03:33:36 executing program 5:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={<r0=>0xffffffffffffffff})
close(r0)
syz_open_dev$sndpcmc(&(0x7f00000033c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0)
io_setup(0x3, &(0x7f0000000000)=<r1=>0x0)
io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}])

03:33:36 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:33:36 executing program 1:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x8d}]}}}]}, 0x3c}}, 0x0)

03:33:36 executing program 0:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0)
setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000080)=0x4fd86c21535aa6a7, 0x4)
getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4)

03:33:36 executing program 3:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0)
mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7be, 0xffffffffffffffff)
write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='#! ./file0'], 0xa)
r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0)
write$cgroup_pid(r2, &(0x7f0000000040), 0x12)
execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

03:33:36 executing program 2:
r0 = memfd_create(&(0x7f0000000140)='\x02\x10\xbbp36\xc9 \x89*\xf9\xe7G\xcb56J=\x0f\x84Ye/\xbb\x88$\x11\x96q\x88\xff\x06\xfbL\x7f4\x17\xb6Q\xa2\xa5\x1e\x0f\xec,5\xe6\x0fS\xcc\\\xea)\x1f\xfcb3\xf1-\xd6\x15\xba\xd3\xe0\x1e\xc2\f\x86\x84S\x8c\x81\xd6I,\xd9*\xe4\xa7\x14\xf0\x1d\xec\x92\xf9\xb1\x12.\xcb+\xcf\xb9\x10\x1f\x80\x80\x10\x15\xf1\x86B\x05\x93\x1c\x11W\x9a$\xa1e\x05\xde=LP\x95\x8a\x1f\x84\xd3\xbc\xe4L}\xa9)Z\xc3\x18o\x12\xaa\x1f\xb1uC\xe5\xba\x8e\xfc\xc2u\xd0H\xa3\xaa\xb4\xd3\x81sV\x04+\xd1\xd3\x82O\x19\xbc?;\xf7C\xd3\r\xbbk\x93\x98|\x8aW\xba\xb5Z\x98\x02&\xe5\x04u\x0f\xa0\xa3\'2v\x91KV\x8e\xa4u\xa77\xcfn\xac\x81\xac\xf3\x9b\r-\x80\x82\xa7\xa7h\xfb\xd2\xba\x03\xf8$5\xd6\x86\xa3\x7f\xac&}DX\xdbp3g\xe6Uy\x85]\xb7\xf8\xa0\xca\x16}8u\xff\x98\x0fL\xce\x00\xacU\x06', 0x7)
fallocate(r0, 0x10, 0x0, 0x7)

03:33:36 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)

03:33:36 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r2, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
setsockopt$inet6_group_source_req(r2, 0x29, 0x0, &(0x7f00000000c0)={0x8000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x10010000000035)
fcntl$setstatus(r2, 0x4, 0x80000000002c00)

03:33:36 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00')
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
listen(r2, 0x0)
sendfile(r0, r0, 0x0, 0x1008147c)

03:33:36 executing program 0:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0)
setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000080)=0x4fd86c21535aa6a7, 0x4)
getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4)

[  719.863995] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
03:33:36 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
unshare(0x20600)
connect$inet(r0, &(0x7f00000000c0), 0xfffffffffffffe53)

03:33:37 executing program 1:
perf_event_open(&(0x7f0000000680)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2)
r1 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x0)
ftruncate(r1, 0x1000000)
sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef)

03:33:37 executing program 2:
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x1000801, 0x0)
chdir(&(0x7f00000000c0)='./file0\x00')
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00<s\x8c\')tU\x19\x9a)S\xa7b\xce\xd8\xde\x95\xf6\xc3\\n\xc1\xa2)o\xee\x97\xdf\xe9\xf3\xfdJ\xe8`7iY\x86~\xd8\xecy\xc00.\x90\xfc\xac\xa0\xb8\x1d\x1a\x7f\xec\xea\np\xb4\xd5l\xb5\xc3\xc7w%\x16a~]P\x04\xc7 \xf7\x92\x8b\x8f\x9d&\\\xf9\xa3\x96G<\xd4\x80\x16/\x81\xe7(\x8b\xde9]\xaf\xbc\xb0\r}Ne\xfaX\xb0\x8a\xbd\x1d\xfc\xd4\x91\x95\x00\v\x14a0_\xd9\x1f\xc7\xb5\xc3FS\x16\x03~\xbbc*\xa3\xab`\x06\xf0\xbc\xacJY\xe7\xb2\x8cw\xa4U.\xa4\xe2u\x1d!jVL}#O\t\xb2`\x0e\xe9\xc6*\xf7\xf8Uh\x8e\x01\xf1b\xf5;\x8a\x17\x9a\x0fq\x01\x91pSR\x82-H\n\x1fP\xb6*\xc9\xfd\x89\xb5\x7f\x87m\"\xaa\xce\xed\a\xf2\xfd<\x10\xb8\xcf\xfac\xcc\x0f\xd2\xdd\xcd#8\"\x8b\xf2\xccA\v\xdf\xf5\x8d\xa5-\x02\xaa|\xdd\xd0az\xc8,)\xedf\x89x>\a\x13', 0x275a, 0x0)

03:33:37 executing program 3:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0)
mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7be, 0xffffffffffffffff)
write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='#! ./file0'], 0xa)
r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0)
write$cgroup_pid(r2, &(0x7f0000000040), 0x12)
execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

03:33:37 executing program 0:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0)
setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000080)=0x4fd86c21535aa6a7, 0x4)
getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4)

03:33:37 executing program 0:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0)
setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000080)=0x4fd86c21535aa6a7, 0x4)
getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4)

03:33:37 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4)
unshare(0x20600)
connect$inet(r0, &(0x7f00000000c0), 0x10)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4)
sendmsg$sock(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000000000)="f6", 0x1}], 0x1}, 0x0)
recvmsg(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x142)

03:33:37 executing program 3:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0)
mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7be, 0xffffffffffffffff)
write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='#! ./file0'], 0xa)
r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0)
write$cgroup_pid(r2, &(0x7f0000000040), 0x12)
execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

03:33:37 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x19)
listen(r0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0)
lsetxattr$security_smack_entry(0x0, 0x0, &(0x7f0000000180)='l\x85\xa2\xb2\xc7g\xe3\a\x00Q\xb9\xf8\xe8\xa1io\x00\n\xfc)k\x05\x00\x91\xed\x00\x00\b\x00\xa4\xa9\xbe\x00', 0x21, 0x0)
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'lo\x00'})
r3 = socket$inet(0x2, 0x80000, 0xbb)
getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000080), &(0x7f00000001c0)=0x68)
ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff})
r4 = accept4(r0, 0x0, 0x0, 0x0)
sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0)

[  720.247915] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
[  721.023834] ==================================================================
[  721.031362] BUG: KASAN: use-after-free in tcp_ack+0x414f/0x4760
[  721.037469] Read of size 4 at addr ffff8880923ba06c by task syz-executor.2/17982
[  721.044991] 
[  721.046604] CPU: 1 PID: 17982 Comm: syz-executor.2 Not tainted 4.14.143 #0
[  721.053592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  721.062927] Call Trace:
[  721.065504]  <IRQ>
[  721.067659]  dump_stack+0x138/0x197
[  721.071266]  ? tcp_ack+0x414f/0x4760
[  721.074960]  print_address_description.cold+0x7c/0x1dc
[  721.080233]  ? tcp_ack+0x414f/0x4760
[  721.083934]  kasan_report.cold+0xa9/0x2af
[  721.088080]  __asan_report_load4_noabort+0x14/0x20
[  721.093006]  tcp_ack+0x414f/0x4760
[  721.096528]  ? _raw_spin_unlock_irqrestore+0x6b/0xe0
[  721.101639]  ? trace_hardirqs_on+0x10/0x10
[  721.105866]  ? tcp_fastretrans_alert+0x2620/0x2620
[  721.110780]  ? lock_downgrade+0x6e0/0x6e0
[  721.114910]  tcp_rcv_established+0x3e9/0x1650
[  721.119383]  ? trace_hardirqs_on+0xd/0x10
[  721.123522]  ? save_trace+0x290/0x290
[  721.127306]  ? tcp_data_queue+0x3730/0x3730
[  721.131610]  tcp_v6_do_rcv+0x417/0x1190
[  721.135584]  tcp_v6_rcv+0x2446/0x2ed0
[  721.139362]  ? save_trace+0x290/0x290
[  721.143255]  ip6_input_finish+0x300/0x15a0
[  721.147489]  ip6_input+0xd5/0x340
[  721.150923]  ? ip6_input_finish+0x15a0/0x15a0
[  721.155403]  ? ipv6_rcv+0x16aa/0x1d20
[  721.159194]  ? ip6_rcv_finish+0x7a0/0x7a0
[  721.163321]  ip6_rcv_finish+0x23f/0x7a0
[  721.167275]  ipv6_rcv+0xe4d/0x1d20
[  721.170804]  ? percpu_ida_for_each_free+0x2b8/0x524
[  721.175802]  ? ip6_input+0x340/0x340
[  721.179497]  ? ip6_make_skb+0x410/0x410
[  721.183457]  ? refcount_inc_not_zero+0x88/0xe0
[  721.188017]  ? ip6_input+0x340/0x340
[  721.191717]  __netif_receive_skb_core+0x1eae/0x2ca0
[  721.196721]  ? trace_hardirqs_on+0x10/0x10
[  721.200938]  ? enqueue_to_backlog+0xcc0/0xcc0
[  721.205415]  ? process_backlog+0x43e/0x730
[  721.209650]  ? lock_acquire+0x16f/0x430
[  721.213609]  __netif_receive_skb+0x2c/0x1b0
[  721.217916]  ? __netif_receive_skb+0x2c/0x1b0
[  721.222417]  process_backlog+0x21f/0x730
[  721.226460]  ? mark_held_locks+0xb1/0x100
[  721.230591]  net_rx_action+0x490/0xf80
[  721.234470]  ? napi_complete_done+0x4f0/0x4f0
[  721.238947]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  721.244381]  __do_softirq+0x244/0x9a0
[  721.248164]  ? ip6_finish_output2+0x9c0/0x21b0
[  721.252727]  do_softirq_own_stack+0x2a/0x40
[  721.257033]  </IRQ>
[  721.259251]  do_softirq.part.0+0x10e/0x160
[  721.263466]  __local_bh_enable_ip+0x154/0x1a0
[  721.267943]  ip6_finish_output2+0x9f3/0x21b0
[  721.272334]  ? ip6_forward_finish+0x480/0x480
[  721.276813]  ? __lock_is_held+0xb6/0x140
[  721.280855]  ? check_preemption_disabled+0x3c/0x250
[  721.285856]  ip6_finish_output+0x4f4/0xb50
[  721.290069]  ? ip6_finish_output+0x4f4/0xb50
[  721.294458]  ip6_output+0x20f/0x6d0
[  721.298075]  ? ip6_finish_output+0xb50/0xb50
[  721.302483]  ? __lock_is_held+0xb6/0x140
[  721.306532]  ? check_preemption_disabled+0x3c/0x250
[  721.311529]  ? ip6_fragment+0x32c0/0x32c0
[  721.315664]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  721.321106]  ip6_xmit+0xd53/0x1eb0
[  721.324637]  ? ip6_finish_output2+0x21b0/0x21b0
[  721.329283]  ? ip6_dst_check+0x116/0x2c0
[  721.333325]  ? save_trace+0x290/0x290
[  721.337107]  ? ip6_append_data+0x2f0/0x2f0
[  721.341320]  ? __lock_is_held+0xb6/0x140
[  721.345359]  ? check_preemption_disabled+0x3c/0x250
[  721.350360]  inet6_csk_xmit+0x286/0x4d0
[  721.354311]  ? inet6_csk_update_pmtu+0x140/0x140
[  721.359048]  ? tcp_md5_do_lookup+0x1d3/0x530
[  721.363441]  __tcp_transmit_skb+0x172c/0x2fe0
[  721.367947]  ? __tcp_select_window+0x6e0/0x6e0
[  721.372510]  ? kvm_clock_read+0x23/0x40
[  721.376463]  ? sched_clock_cpu+0x1b/0x1c0
[  721.380592]  ? tcp_small_queue_check+0x184/0x1e0
[  721.385334]  tcp_write_xmit+0x523/0x4960
[  721.389379]  ? tcp_v6_md5_lookup+0x23/0x30
[  721.393599]  ? tcp_established_options+0x2c5/0x420
[  721.398513]  ? tcp_current_mss+0x1b1/0x2f0
[  721.402736]  __tcp_push_pending_frames+0xa6/0x260
[  721.407559]  tcp_send_fin+0x17e/0xc40
[  721.411338]  tcp_close+0xcc8/0xfb0
[  721.414975]  ? lock_acquire+0x16f/0x430
[  721.418937]  ? ip_mc_drop_socket+0x1d6/0x230
[  721.423347]  inet_release+0xec/0x1c0
[  721.427067]  inet6_release+0x53/0x80
[  721.430770]  __sock_release+0xce/0x2b0
[  721.434683]  ? __sock_release+0x2b0/0x2b0
[  721.438813]  sock_close+0x1b/0x30
[  721.442258]  __fput+0x275/0x7a0
[  721.445533]  ____fput+0x16/0x20
[  721.448800]  task_work_run+0x114/0x190
[  721.452678]  exit_to_usermode_loop+0x1da/0x220
[  721.457243]  do_syscall_64+0x4bc/0x640
[  721.461110]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  721.465940]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  721.471118] RIP: 0033:0x4135d1
[  721.474292] RSP: 002b:00007ffe39437670 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
[  721.481986] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 00000000004135d1
[  721.489246] RDX: 0000000000000000 RSI: 000000000000033f RDI: 0000000000000006
[  721.496533] RBP: 0000000000000001 R08: 000000008beec33f R09: 000000008beec343
[  721.503785] R10: 00007ffe39437750 R11: 0000000000000293 R12: 000000000075c9a0
[  721.511032] R13: 000000000075c9a0 R14: 0000000000760a18 R15: ffffffffffffffff
[  721.518290] 
[  721.519898] Allocated by task 17984:
[  721.523605]  save_stack_trace+0x16/0x20
[  721.527570]  save_stack+0x45/0xd0
[  721.531002]  kasan_kmalloc+0xce/0xf0
[  721.534696]  kasan_slab_alloc+0xf/0x20
[  721.538576]  kmem_cache_alloc_node+0x144/0x780
[  721.543137]  __alloc_skb+0x9c/0x500
[  721.546743]  sk_stream_alloc_skb+0xb3/0x780
[  721.551049]  tcp_sendmsg_locked+0xf61/0x3200
[  721.555453]  tcp_sendmsg+0x30/0x50
[  721.558980]  inet_sendmsg+0x122/0x500
[  721.562760]  sock_sendmsg+0xce/0x110
[  721.566453]  SYSC_sendto+0x206/0x310
[  721.570144]  SyS_sendto+0x40/0x50
[  721.573578]  do_syscall_64+0x1e8/0x640
[  721.577445]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  721.582609] 
[  721.584215] Freed by task 17984:
[  721.587561]  save_stack_trace+0x16/0x20
[  721.591514]  save_stack+0x45/0xd0
[  721.594949]  kasan_slab_free+0x75/0xc0
[  721.598838]  kmem_cache_free+0x83/0x2b0
[  721.602791]  kfree_skbmem+0x8d/0x120
[  721.606480]  __kfree_skb+0x1e/0x30
[  721.609997]  tcp_remove_empty_skb.part.0+0x231/0x2e0
[  721.615081]  tcp_sendmsg_locked+0x1ced/0x3200
[  721.619575]  tcp_sendmsg+0x30/0x50
[  721.623093]  inet_sendmsg+0x122/0x500
[  721.626875]  sock_sendmsg+0xce/0x110
[  721.630565]  SYSC_sendto+0x206/0x310
[  721.634256]  SyS_sendto+0x40/0x50
[  721.637693]  do_syscall_64+0x1e8/0x640
[  721.641583]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  721.646820] 
[  721.648458] The buggy address belongs to the object at ffff8880923ba040
[  721.648458]  which belongs to the cache skbuff_fclone_cache of size 472
[  721.661858] The buggy address is located 44 bytes inside of
[  721.661858]  472-byte region [ffff8880923ba040, ffff8880923ba218)
[  721.673637] The buggy address belongs to the page:
[  721.678564] page:ffffea000248ee80 count:1 mapcount:0 mapping:ffff8880923ba040 index:0x0
[  721.686696] flags: 0x1fffc0000000100(slab)
[  721.690911] raw: 01fffc0000000100 ffff8880923ba040 0000000000000000 0000000100000006
[  721.698769] raw: ffffea000269f8a0 ffffea0002a426e0 ffff88821b7203c0 0000000000000000
[  721.706623] page dumped because: kasan: bad access detected
[  721.712329] 
[  721.713953] Memory state around the buggy address:
[  721.718858]  ffff8880923b9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  721.726193]  ffff8880923b9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  721.733528] >ffff8880923ba000: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb
[  721.740880]                                                           ^
[  721.747618]  ffff8880923ba080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  721.754969]  ffff8880923ba100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  721.762339] ==================================================================
[  721.769671] Disabling lock debugging due to kernel taint
[  721.775142] Kernel panic - not syncing: panic_on_warn set ...
[  721.775142] 
[  721.782502] CPU: 1 PID: 17982 Comm: syz-executor.2 Tainted: G    B           4.14.143 #0
[  721.790711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  721.800053] Call Trace:
[  721.802614]  <IRQ>
[  721.804748]  dump_stack+0x138/0x197
[  721.808364]  ? tcp_ack+0x414f/0x4760
[  721.812069]  panic+0x1f2/0x426
[  721.815236]  ? add_taint.cold+0x16/0x16
[  721.819196]  kasan_end_report+0x47/0x4f
[  721.823154]  kasan_report.cold+0x130/0x2af
[  721.827428]  __asan_report_load4_noabort+0x14/0x20
[  721.832357]  tcp_ack+0x414f/0x4760
[  721.835879]  ? _raw_spin_unlock_irqrestore+0x6b/0xe0
[  721.840966]  ? trace_hardirqs_on+0x10/0x10
[  721.845188]  ? tcp_fastretrans_alert+0x2620/0x2620
[  721.850102]  ? lock_downgrade+0x6e0/0x6e0
[  721.854339]  tcp_rcv_established+0x3e9/0x1650
[  721.858832]  ? trace_hardirqs_on+0xd/0x10
[  721.862959]  ? save_trace+0x290/0x290
[  721.866740]  ? tcp_data_queue+0x3730/0x3730
[  721.871043]  tcp_v6_do_rcv+0x417/0x1190
[  721.874994]  tcp_v6_rcv+0x2446/0x2ed0
[  721.878776]  ? save_trace+0x290/0x290
[  721.882568]  ip6_input_finish+0x300/0x15a0
[  721.886783]  ip6_input+0xd5/0x340
[  721.890211]  ? ip6_input_finish+0x15a0/0x15a0
[  721.894689]  ? ipv6_rcv+0x16aa/0x1d20
[  721.898526]  ? ip6_rcv_finish+0x7a0/0x7a0
[  721.902650]  ip6_rcv_finish+0x23f/0x7a0
[  721.906602]  ipv6_rcv+0xe4d/0x1d20
[  721.910119]  ? percpu_ida_for_each_free+0x2b8/0x524
[  721.915173]  ? ip6_input+0x340/0x340
[  721.918877]  ? ip6_make_skb+0x410/0x410
[  721.922833]  ? refcount_inc_not_zero+0x88/0xe0
[  721.927401]  ? ip6_input+0x340/0x340
[  721.931110]  __netif_receive_skb_core+0x1eae/0x2ca0
[  721.936162]  ? trace_hardirqs_on+0x10/0x10
[  721.940383]  ? enqueue_to_backlog+0xcc0/0xcc0
[  721.944859]  ? process_backlog+0x43e/0x730
[  721.949077]  ? lock_acquire+0x16f/0x430
[  721.953028]  __netif_receive_skb+0x2c/0x1b0
[  721.957326]  ? __netif_receive_skb+0x2c/0x1b0
[  721.961912]  process_backlog+0x21f/0x730
[  721.965964]  ? mark_held_locks+0xb1/0x100
[  721.970108]  net_rx_action+0x490/0xf80
[  721.973978]  ? napi_complete_done+0x4f0/0x4f0
[  721.978506]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  721.983944]  __do_softirq+0x244/0x9a0
[  721.987779]  ? ip6_finish_output2+0x9c0/0x21b0
[  721.992421]  do_softirq_own_stack+0x2a/0x40
[  721.996736]  </IRQ>
[  721.998986]  do_softirq.part.0+0x10e/0x160
[  722.003207]  __local_bh_enable_ip+0x154/0x1a0
[  722.007695]  ip6_finish_output2+0x9f3/0x21b0
[  722.012083]  ? ip6_forward_finish+0x480/0x480
[  722.016560]  ? __lock_is_held+0xb6/0x140
[  722.020622]  ? check_preemption_disabled+0x3c/0x250
[  722.025630]  ip6_finish_output+0x4f4/0xb50
[  722.029846]  ? ip6_finish_output+0x4f4/0xb50
[  722.034239]  ip6_output+0x20f/0x6d0
[  722.037845]  ? ip6_finish_output+0xb50/0xb50
[  722.042232]  ? __lock_is_held+0xb6/0x140
[  722.046276]  ? check_preemption_disabled+0x3c/0x250
[  722.051281]  ? ip6_fragment+0x32c0/0x32c0
[  722.055409]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  722.060835]  ip6_xmit+0xd53/0x1eb0
[  722.064352]  ? ip6_finish_output2+0x21b0/0x21b0
[  722.068998]  ? ip6_dst_check+0x116/0x2c0
[  722.073044]  ? save_trace+0x290/0x290
[  722.076822]  ? ip6_append_data+0x2f0/0x2f0
[  722.081036]  ? __lock_is_held+0xb6/0x140
[  722.085074]  ? check_preemption_disabled+0x3c/0x250
[  722.090092]  inet6_csk_xmit+0x286/0x4d0
[  722.094045]  ? inet6_csk_update_pmtu+0x140/0x140
[  722.098776]  ? tcp_md5_do_lookup+0x1d3/0x530
[  722.103216]  __tcp_transmit_skb+0x172c/0x2fe0
[  722.107690]  ? __tcp_select_window+0x6e0/0x6e0
[  722.112252]  ? kvm_clock_read+0x23/0x40
[  722.116204]  ? sched_clock_cpu+0x1b/0x1c0
[  722.120329]  ? tcp_small_queue_check+0x184/0x1e0
[  722.125060]  tcp_write_xmit+0x523/0x4960
[  722.129097]  ? tcp_v6_md5_lookup+0x23/0x30
[  722.133320]  ? tcp_established_options+0x2c5/0x420
[  722.138238]  ? tcp_current_mss+0x1b1/0x2f0
[  722.142463]  __tcp_push_pending_frames+0xa6/0x260
[  722.147306]  tcp_send_fin+0x17e/0xc40
[  722.151082]  tcp_close+0xcc8/0xfb0
[  722.154600]  ? lock_acquire+0x16f/0x430
[  722.158548]  ? ip_mc_drop_socket+0x1d6/0x230
[  722.162931]  inet_release+0xec/0x1c0
[  722.166623]  inet6_release+0x53/0x80
[  722.170316]  __sock_release+0xce/0x2b0
[  722.174178]  ? __sock_release+0x2b0/0x2b0
[  722.178304]  sock_close+0x1b/0x30
[  722.181743]  __fput+0x275/0x7a0
[  722.185000]  ____fput+0x16/0x20
[  722.188304]  task_work_run+0x114/0x190
[  722.192173]  exit_to_usermode_loop+0x1da/0x220
[  722.196739]  do_syscall_64+0x4bc/0x640
[  722.200611]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  722.205435]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  722.210599] RIP: 0033:0x4135d1
[  722.213767] RSP: 002b:00007ffe39437670 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
[  722.221449] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 00000000004135d1
[  722.228695] RDX: 0000000000000000 RSI: 000000000000033f RDI: 0000000000000006
[  722.235939] RBP: 0000000000000001 R08: 000000008beec33f R09: 000000008beec343
[  722.243184] R10: 00007ffe39437750 R11: 0000000000000293 R12: 000000000075c9a0
[  722.250445] R13: 000000000075c9a0 R14: 0000000000760a18 R15: ffffffffffffffff
[  722.259088] Kernel Offset: disabled
[  722.262711] Rebooting in 86400 seconds..