0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 03:37:24 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:24 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:24 executing program 0: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580)) getgroups(0x0, &(0x7f0000000600)) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000008c0)='./file1\x00', &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:37:25 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:25 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) 03:37:25 executing program 3: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 03:37:25 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:25 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:25 executing program 0: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580)) getgroups(0x0, &(0x7f0000000600)) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000008c0)='./file1\x00', &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:37:25 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:26 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) 03:37:26 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) 03:37:26 executing program 3: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 03:37:26 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:26 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) 03:37:26 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) 03:37:26 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) 03:37:26 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) 03:37:26 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) 03:37:26 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:26 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) 03:37:26 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:26 executing program 0: ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) socket$unix(0x1, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000005c0)) setitimer(0x0, &(0x7f00000006c0), &(0x7f0000000680)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000004800)=""/19, 0x13) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0410fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa0f9a5f0beefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_execute_func(&(0x7f0000000cc0)="c4627913ed410f380436c462fd30cf646767f0440fc10ac481f97ef664f30f5ec1c402f91eba0008000047355f8584ad80d99dc4a1b7d02a") 03:37:26 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) 03:37:26 executing program 3: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 03:37:27 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:27 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) 03:37:27 executing program 0: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/ip6_tables_targets\x00') ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)={0x0, @aes128, 0x0, "42c211e96c0d5bac"}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0xb, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000300)='y\x00', 0xffffffffffffffff}, 0x30) ptrace(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a03b6969ef69dc00d9fb69203737c3397c05bd060f38211a40a541ef0f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c42279929f9f") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') syz_execute_func(&(0x7f0000000a40)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e0970020fe9c09f66410b850f00000062c463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fddd4008356d0000000000f047305cccb241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c4b641dcfdc9c4427d0d1aa4212dfca50000262666430ffb348b1f7f") 03:37:27 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:27 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:27 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:27 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) 03:37:27 executing program 3: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 03:37:27 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) 03:37:28 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:28 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:28 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:28 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) 03:37:28 executing program 3: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 03:37:28 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) 03:37:28 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:29 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:29 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:29 executing program 1: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:37:29 executing program 3: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 03:37:29 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) 03:37:29 executing program 3: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 03:37:29 executing program 3: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 03:37:29 executing program 3: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 03:37:29 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:29 executing program 3: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 03:37:29 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:29 executing program 3: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 03:37:29 executing program 3: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 03:37:29 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:30 executing program 1: 03:37:30 executing program 3: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 03:37:30 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:30 executing program 3: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 03:37:30 executing program 1: 03:37:30 executing program 1: 03:37:30 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:30 executing program 3: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 03:37:30 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) 03:37:30 executing program 1: 03:37:30 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:30 executing program 1: 03:37:30 executing program 1: 03:37:30 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:31 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:31 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:31 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:31 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:31 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:31 executing program 3: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 03:37:31 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) 03:37:32 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:32 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:32 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:32 executing program 3: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000940)=0xc) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 03:37:32 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:32 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) 03:37:32 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:32 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:32 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:33 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:33 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:33 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:33 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:33 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:33 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:34 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:34 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:34 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:34 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:34 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:34 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:34 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:34 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:35 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:35 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:35 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:35 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:35 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:35 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:35 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:36 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:36 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:36 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:36 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:36 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) 03:37:36 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:37 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:37 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:37 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:37 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:37 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) 03:37:37 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:37 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:37 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:38 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:38 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:38 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) 03:37:38 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:38 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:38 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:38 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:39 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:39 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:39 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:39 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:39 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:39 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:40 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:40 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:40 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:40 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:40 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:40 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:40 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:40 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:41 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:41 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:41 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:41 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:41 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:41 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:41 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:42 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:42 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:42 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:42 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:42 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:42 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:42 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:43 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:43 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:43 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:43 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:43 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:43 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:43 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:43 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:44 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:44 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:44 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:44 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:44 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:44 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:44 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:44 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:44 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:44 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:44 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:44 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:44 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:44 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:44 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:44 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:45 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:45 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:45 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:45 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:45 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:45 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:45 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:45 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:45 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:45 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:45 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:45 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:45 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:45 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:45 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:46 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:46 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:46 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:46 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:46 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:46 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:46 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:46 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:47 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:47 executing program 2: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000240)}}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) unlink(&(0x7f0000000200)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0), 0x4) ustat(0x0, &(0x7f0000000300)) 03:37:47 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:47 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:47 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:47 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:48 executing program 0: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) 03:37:48 executing program 2: clock_gettime(0xfffffffffffffffd, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") epoll_create(0x0) memfd_create(&(0x7f00000002c0)='\x00', 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000340)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) mmap(&(0x7f0000074000/0xf000)=nil, 0xf000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @multicast2}, &(0x7f00000000c0)=0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000280), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000440)="0fb042c0c4c2f59aebf0f7948f0ecc8962360f1eaed0000000c421e96d715dc48215b774fcdac4e13973f000c4c2f91cad99d24a16440fe9cac481cd6d9cecfbcb580f") 03:37:48 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:48 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:48 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:37:48 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:48 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:48 executing program 0: 03:37:48 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:48 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:48 executing program 0: 03:37:49 executing program 0: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580)) getgroups(0x0, &(0x7f0000000600)) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:37:49 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:37:49 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:49 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:49 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:49 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:49 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:37:49 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:37:50 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:50 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:50 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:50 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:50 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:50 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:37:50 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:37:50 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:50 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:50 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:50 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:51 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:51 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:51 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:51 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:51 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:51 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:51 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:37:51 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:51 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:37:51 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:51 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:51 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:51 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:37:51 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:52 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:52 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:52 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:37:52 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:52 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:37:52 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:52 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:37:52 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:52 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:37:52 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:37:52 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:52 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:37:53 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:53 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:53 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:53 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:37:53 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:37:53 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:53 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:53 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:37:53 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:37:53 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:37:53 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:37:53 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:37:54 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:54 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:37:54 executing program 1: rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000100), 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f0000000440)="42805da08a36c05a00a0a3ef69dc0f01ee0dcec421185f9afeefffffc4e2314676fe2900c402fd25e00f993d233d23414480f70e676681f699890f91302fbae5e5e575450fa81a3e67f6400006e2986465672666440f1a077f") openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000200)=""/90) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) 03:37:54 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:37:54 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:37:54 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:37:54 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:54 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:37:54 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:54 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:37:54 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:37:54 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:37:54 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:54 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:37:55 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:37:55 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:37:55 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:37:55 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:55 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:55 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:37:55 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:55 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:37:56 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:37:56 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:56 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:37:56 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:56 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:56 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:37:56 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:37:57 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:37:57 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:57 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:57 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:57 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:37:57 executing program 0: r0 = socket$inet6(0xa, 0x1000002000000802, 0x0) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000d40)={'team_slave_1\x00', @ifru_names='team_slave_1\x00'}) 03:37:57 executing program 0: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003d80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) gettid() ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000004c0)) 03:37:57 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:37:57 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:58 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:58 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:58 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:58 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:58 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:37:58 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:37:58 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:58 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:59 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:59 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:59 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:59 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:37:59 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:37:59 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:37:59 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:00 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:00 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:00 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:00 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:00 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:38:00 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:00 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:00 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:01 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:01 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:01 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:38:01 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:01 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:01 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:02 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:02 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:02 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() 03:38:02 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:02 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:02 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:02 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:03 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:03 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() 03:38:03 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:03 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:03 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:03 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:04 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:04 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() 03:38:04 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:04 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:04 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:04 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:04 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:04 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:38:05 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:05 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:05 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:05 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:05 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:05 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:38:06 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:06 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:06 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:06 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:06 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:06 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:38:06 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:06 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:07 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:07 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:07 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:07 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:38:07 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:07 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:07 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:08 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:08 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:08 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:38:08 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:08 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:08 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:08 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:09 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:09 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:38:09 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:09 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:09 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:09 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:10 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:10 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:38:10 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:10 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:10 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:10 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:11 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:11 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:38:11 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:11 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:11 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:11 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:11 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:11 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:38:12 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:12 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:12 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:12 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:12 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:12 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:38:13 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:13 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:13 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:13 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:13 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:38:13 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:13 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:13 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:14 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:14 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:14 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:38:14 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:14 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:14 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:14 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:15 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:15 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:38:15 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:15 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:15 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:15 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:16 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:16 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:38:16 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:16 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:16 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:16 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:17 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:17 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:38:17 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:17 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:17 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:17 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:18 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:18 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:38:18 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:18 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:18 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:18 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:18 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:18 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:38:19 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:19 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:19 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:38:19 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:19 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:19 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:38:19 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:19 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:20 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:20 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) [ 1862.820562] INFO: task syz-executor3:25520 blocked for more than 140 seconds. [ 1862.828268] Not tainted 4.9.127+ #39 [ 1862.873402] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1862.927861] syz-executor3 D29608 25520 25519 0x00000000 [ 1862.967631] ffff880107f6df00 ffff88017eeecd00 ffff8801d5ccf380 ffff880107b6af80 [ 1863.034726] ffff8801db721018 ffff8801c6557850 ffffffff8277dc12 ffff880107f6e7a8 [ 1863.090455] ffffffff83accdd0 ffff8801db721018 00000000000011d1 ffff8801db7218f0 [ 1863.151509] Call Trace: [ 1863.170883] [] ? __schedule+0x662/0x1b10 [ 1863.209851] [] schedule+0x7f/0x1b0 [ 1863.254456] [] schedule_timeout+0x735/0xe20 [ 1863.294713] [] ? usleep_range+0x140/0x140 [ 1863.335135] [] ? mark_wake_futex+0x120/0x120 03:38:20 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") [ 1863.376710] [] ? debug_lockdep_rcu_enabled+0x77/0x90 03:38:20 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) [ 1863.422914] [] ? mark_held_locks+0xc7/0x130 [ 1863.460349] [] ? _raw_spin_unlock_irq+0x27/0x50 [ 1863.501168] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 1863.536496] [] __ldsem_down_read_nested+0x2c4/0x4f0 03:38:20 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:38:20 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) [ 1863.576782] [] ? ldsem_down_read+0x32/0x40 [ 1863.613065] [] ? __ldsem_wake+0x330/0x330 03:38:20 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) [ 1863.644209] [] ldsem_down_read+0x32/0x40 [ 1863.673915] [] tty_ldisc_ref_wait+0x25/0x80 03:38:20 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) [ 1863.700544] [] tty_ioctl+0x3b6/0x2190 [ 1863.731142] [] ? no_tty+0xa0/0xa0 [ 1863.753897] [] ? avc_ss_reset+0x110/0x110 [ 1863.791159] [] ? do_futex+0x175/0x1840 [ 1863.825707] [] ? __lock_acquire+0x654/0x4a10 [ 1863.863297] [] ? exit_robust_list+0x220/0x220 [ 1863.899722] [] ? __might_sleep+0x95/0x1a0 [ 1863.934971] [] ? no_tty+0xa0/0xa0 [ 1863.968178] [] do_vfs_ioctl+0x1ac/0x11a0 [ 1864.004376] [] ? ioctl_preallocate+0x220/0x220 [ 1864.041008] [] ? selinux_parse_skb.constprop.42+0x1a90/0x1a90 [ 1864.087981] [] ? check_preemption_disabled+0x3b/0x170 [ 1864.129215] [] ? __fget+0x214/0x3d0 [ 1864.162653] [] ? __fget+0x23b/0x3d0 [ 1864.195539] [] ? __fget+0x47/0x3d0 03:38:21 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") [ 1864.228653] [] ? security_file_ioctl+0x8f/0xc0 [ 1864.266552] [] SyS_ioctl+0x8f/0xc0 03:38:21 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) [ 1864.300797] [] ? do_vfs_ioctl+0x11a0/0x11a0 [ 1864.330389] [] do_syscall_64+0x19f/0x480 [ 1864.363762] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb 03:38:21 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000440)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f000000d300)=ANY=[], &(0x7f0000000bc0)=""/137, 0x0, 0x89}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/zero\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000d00)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000d40)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/load\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)) socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getgid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002500)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000002580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000025c0)=0x1c, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000026c0)) accept$inet6(0xffffffffffffffff, &(0x7f0000002700)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000002740)=0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002800)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000002840)='/dev/uhid\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000002880)='net/sco\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000028c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000002900)='selinux$\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002980)='ns/pid\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000029c0)='cpuset.effective_mems\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002a00), &(0x7f0000002a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000002c80)=""/26, 0x1a, 0x1a}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002d00)='ns/net\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002d40)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000003200)=0xe8) lstat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003440)=0xe8) getgid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/access\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000036c0)) open$dir(&(0x7f0000003700)='./file0\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003740)={{{@in=@local, @in=@local}}, {{@in=@local}}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004ec0)='/selinux/context\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000004f00)) clock_gettime(0x0, &(0x7f0000009fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009e40), 0x0, 0x0, &(0x7f000000a000)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a040)='/selinux/validatetrans\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000a080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a0c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a100)={{{@in=@multicast2, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000000a200)=0xe8) stat(&(0x7f000000a240)='./file0\x00', &(0x7f000000a280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f000000a300)) fstat(0xffffffffffffff9c, &(0x7f000000a340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") [ 1864.408998] [ 1864.408998] Showing all locks held in the system: [ 1864.449666] 2 locks held by khungtaskd/24: [ 1864.453947] #0: (rcu_read_lock){......}, at: [] watchdog+0x11c/0xa20 [ 1864.462689] #1: (tasklist_lock){.+.+..}, at: [] debug_show_all_locks+0x79/0x218 [ 1864.472415] 2 locks held by getty/2020: [ 1864.476374] #0: (&tty->ldisc_sem){++++++}, at: [] ldsem_down_read+0x32/0x40 [ 1864.485722] #1: (&ldata->atomic_read_lock){+.+...}, at: [] n_tty_read+0x202/0x16e0 [ 1864.495724] 2 locks held by syz-executor2/14768: [ 1864.500469] #0: (&tty->ldisc_sem){++++++}, at: [] ldsem_down_read+0x32/0x40 [ 1864.509800] #1: (&ldata->atomic_read_lock){+.+...}, at: [] n_tty_read+0x202/0x16e0 [ 1864.519997] 2 locks held by syz-executor3/25497: [ 1864.524749] #0: (&tty->ldisc_sem){++++++}, at: [] ldsem_down_read+0x32/0x40 [ 1864.534087] #1: (&ldata->atomic_read_lock){+.+...}, at: [] n_tty_read+0x202/0x16e0 [ 1864.544059] 1 lock held by syz-executor3/25520: 03:38:21 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) [ 1864.548711] #0: (&tty->ldisc_sem){++++++}, at: [] ldsem_down_read+0x32/0x40 [ 1864.558077] [ 1864.559689] ============================================= [ 1864.559689] [ 1864.571186] NMI backtrace for cpu 1 [ 1864.574843] CPU: 1 PID: 24 Comm: khungtaskd Not tainted 4.9.127+ #39 [ 1864.581331] ffff8801d9907d08 ffffffff81af11e9 0000000000000000 0000000000000001 [ 1864.589386] 0000000000000001 0000000000000001 ffffffff810967d0 ffff8801d9907d40 03:38:21 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) [ 1864.597442] ffffffff81afbf49 0000000000000001 0000000000000000 0000000000000003 [ 1864.605504] Call Trace: [ 1864.608092] [] dump_stack+0xc1/0x128 [ 1864.613456] [] ? irq_force_complete_move+0x330/0x330 [ 1864.620203] [] nmi_cpu_backtrace.cold.0+0x48/0x87 [ 1864.627100] [] ? irq_force_complete_move+0x330/0x330 [ 1864.633847] [] nmi_trigger_cpumask_backtrace+0x12c/0x151 [ 1864.640946] [] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1864.647950] [] watchdog+0x6ad/0xa20 [ 1864.653220] [] ? watchdog+0x11c/0xa20 [ 1864.658662] [] kthread+0x26d/0x300 [ 1864.663844] [] ? reset_hung_task_detector+0x20/0x20 [ 1864.670503] [] ? kthread_park+0xa0/0xa0 [ 1864.676117] [] ? __switch_to_asm+0x34/0x70 [ 1864.681993] [] ? kthread_park+0xa0/0xa0 [ 1864.687609] [] ? kthread_park+0xa0/0xa0 [ 1864.693228] [] ret_from_fork+0x5c/0x70 [ 1864.698822] Sending NMI from CPU 1 to CPUs 0: [ 1864.703403] NMI backtrace for cpu 0 [ 1864.707029] CPU: 0 PID: 31405 Comm: syz-executor2 Not tainted 4.9.127+ #39 [ 1864.714024] task: ffff8801d3beaf80 task.stack: ffff880109768000 [ 1864.720060] RIP: 0033:[<00000000004023c7>] c [<00000000004023c7>] 0x4023c7 [ 1864.727137] RSP: 002b:00007f8f2091c690 EFLAGS: 00000202 [ 1864.732583] RAX: 0000000000a0b437 RBX: 000000000000000b RCX: 00000000004572d9 [ 1864.739833] RDX: 0000000000000000 RSI: 00007f8f2091c6c0 RDI: 000000000000000b 03:38:22 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) [ 1864.747085] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 1864.754337] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1864.761590] R13: 00000000004d7350 R14: 00000000004ca40d R15: 0000000000000000 [ 1864.768843] FS: 00007f8f2091d700(0000) GS:ffff8801db600000(0000) knlGS:0000000000000000 [ 1864.777050] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1864.782929] CR2: 0000000000726a04 CR3: 00000001c6278000 CR4: 00000000001606b0 03:38:22 executing program 2: ppoll(&(0x7f0000000340), 0x153, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000001c0)) unshare(0x0) getpid() ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000200)}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) stat(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000000200)=0x3d) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:38:22 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 03:38:22 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:22 executing program 4: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) 03:38:22 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 03:38:22 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) signalfd4(0xffffffffffffff9c, &(0x7f00000004c0), 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00'}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000700)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400), 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380)={{0x0, @empty, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) sysinfo(&(0x7f0000005800)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) [ 1865.643928] Kernel panic - not syncing: hung_task: blocked tasks [ 1865.650209] CPU: 1 PID: 24 Comm: khungtaskd Not tainted 4.9.127+ #39 [ 1865.656692] ffff8801d9907cc8 ffffffff81af11e9 ffffffff82878340 00000000ffffffff [ 1865.664746] 0000000000000000 0000000000000001 dffffc0000000000 ffff8801d9907d88 [ 1865.672889] ffffffff813df675 0000000041b58ab3 ffffffff82c287e3 ffffffff813df4b6 [ 1865.680947] Call Trace: [ 1865.683530] [] dump_stack+0xc1/0x128 [ 1865.688894] [] panic+0x1bf/0x39f [ 1865.693903] [] ? add_taint.cold.6+0x16/0x16 [ 1865.699866] [] ? ___preempt_schedule+0x16/0x18 [ 1865.706091] [] ? nmi_trigger_cpumask_backtrace+0x102/0x151 [ 1865.713355] [] watchdog+0x6be/0xa20 [ 1865.718628] [] ? watchdog+0x11c/0xa20 [ 1865.724076] [] kthread+0x26d/0x300 [ 1865.729262] [] ? reset_hung_task_detector+0x20/0x20 [ 1865.735917] [] ? kthread_park+0xa0/0xa0 [ 1865.741537] [] ? __switch_to_asm+0x34/0x70 [ 1865.747412] [] ? kthread_park+0xa0/0xa0 [ 1865.753030] [] ? kthread_park+0xa0/0xa0 [ 1865.758656] [] ret_from_fork+0x5c/0x70 [ 1865.764546] Kernel Offset: disabled [ 1865.768170] Rebooting in 86400 seconds..