fff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:18 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d8", 0x1c, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:18 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:18 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:18 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d8", 0x1c, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x10) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c2677058"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:18 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:18 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x10) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:18 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bd", 0x2a, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:18 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:18 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) 14:36:18 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bd", 0x2a, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:18 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c2677058"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270", 0x36, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) 14:36:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:19 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bd", 0x2a, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:19 executing program 2: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bd", 0x2a, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:19 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270", 0x36, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) 14:36:19 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a", 0x31, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:19 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270", 0x36, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:19 executing program 2: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bd", 0x2a, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c2677058"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00'}) 14:36:19 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a", 0x31, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:19 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:19 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a", 0x31, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:19 executing program 2: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bd", 0x2a, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00'}) 14:36:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:19 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c2677058"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00'}) 14:36:20 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:20 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:20 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:20 executing program 1: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a", 0x31, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:20 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:20 executing program 1: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a", 0x31, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:20 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x0, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:20 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270", 0x36, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:20 executing program 1: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a", 0x31, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:20 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x0, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:20 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd"], 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:20 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270", 0x36, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x10) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:21 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:21 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270", 0x36, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x0, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:21 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d", 0x68, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000240)={'gretap0\x00', r5}) 14:36:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:21 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:21 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:21 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:21 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd"], 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:21 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:21 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:21 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd"], 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:21 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:22 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:22 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x10) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:22 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, 0x0, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:22 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:22 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000), 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:22 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, 0x0, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:22 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69db", 0x61, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000240)={'gretap0\x00', r5}) 14:36:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000), 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:22 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:22 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, 0x0, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:22 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r0, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r1, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'gretap0\x00', r2}) 14:36:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69db", 0x61, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000240)={'gretap0\x00', r5}) 14:36:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000), 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:23 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:23 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r0, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r1, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'gretap0\x00', r2}) 14:36:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69db", 0x61, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000240)={'gretap0\x00', r5}) 14:36:23 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c2677058"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:23 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r0, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r1, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'gretap0\x00', r2}) 14:36:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:23 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:23 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:23 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000200)) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00'}) 14:36:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:23 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:24 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000200)) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00'}) 14:36:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:24 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:24 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000200)) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00'}) 14:36:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c2677058"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:24 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:24 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c2677058"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:24 executing program 2: r0 = syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$setflags(r3, 0x2, 0x1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d", 0x68, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r4, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:24 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:25 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:25 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, 0x0, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:25 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:25 executing program 2: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:25 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, 0x0, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:25 executing program 2: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:25 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:25 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:25 executing program 2: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, 0x0, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:26 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:26 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:26 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:26 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:26 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:26 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:26 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) 14:36:26 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x10) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:26 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x10) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:26 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:26 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) 14:36:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:27 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000240)={'gretap0\x00', r5}) 14:36:27 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) 14:36:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:27 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:27 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000200)) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00'}) 14:36:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:27 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00'}) 14:36:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000240)={'gretap0\x00', r5}) 14:36:27 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000200)) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00'}) 14:36:27 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00), 0x0, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:28 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00'}) 14:36:28 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000200)) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00'}) 14:36:28 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00), 0x0, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000240)={'gretap0\x00', r5}) 14:36:28 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00), 0x0, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:28 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:28 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00), 0x0, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:28 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00'}) 14:36:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:28 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d8", 0x1c, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:28 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d8", 0x1c, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:28 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00), 0x0, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:28 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$setflags(r3, 0x2, 0x1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d", 0x68, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r4, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x10) unlinkat(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:29 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d8", 0x1c, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:29 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00), 0x0, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$setflags(r3, 0x2, 0x1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d", 0x68, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r4, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:29 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bd", 0x2a, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x10) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x10) unlinkat(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x10) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:29 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bd", 0x2a, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x10) unlinkat(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$setflags(r3, 0x2, 0x1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d", 0x68, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r4, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c2677058"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x10) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:29 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bd", 0x2a, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:30 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a", 0x31, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$setflags(r3, 0x2, 0x1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d", 0x68, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r4, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) 14:36:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:30 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a", 0x31, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$setflags(r3, 0x2, 0x1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d", 0x68, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r4, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) 14:36:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c2677058"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:30 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a", 0x31, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$setflags(r3, 0x2, 0x1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d", 0x68, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r4, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) 14:36:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:30 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) 14:36:31 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00'}) 14:36:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 14:36:31 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a", 0x31, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) 14:36:31 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00'}) 14:36:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00'}) 14:36:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:31 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a", 0x31, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 14:36:31 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00'}) 14:36:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00'}) 14:36:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:31 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a", 0x31, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a321"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:31 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) 14:36:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00'}) 14:36:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:32 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r4, 0x0, 0x10) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:32 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455", 0x33, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:32 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455", 0x33, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x20}}, 0x0) 14:36:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:33 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455", 0x33, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x2, 0x0, 0x0, 0x0, 0x1d}}, 0x0}, 0x48) 14:36:33 executing program 2: syz_mount_image$msdos(&(0x7f00000003c0)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@fat=@check_normal='check=normal'}, {@fat=@dos1xfloppy='dos1xfloppy'}]}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="e2b473b48716b33a2ca590a0524dc913", 0xffff}, 0x1c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") 14:36:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:33 executing program 3: syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x5}}}}}, 0x0) 14:36:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:33 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) [ 577.705868] FAT-fs (loop2): bogus number of reserved sectors [ 577.715988] FAT-fs (loop2): This doesn't look like a DOS 1.x volume; no bootstrapping code 14:36:33 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x40400, &(0x7f0000000200), 0x0, 0x0, 0x0) 14:36:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) [ 577.766107] FAT-fs (loop2): Can't find a valid FAT filesystem 14:36:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:33 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:36:34 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f0000000480)="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", 0x1fe, 0x2}]) 14:36:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:34 executing program 2: syz_mount_image$msdos(&(0x7f00000003c0)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@fat=@check_normal='check=normal'}, {@fat=@dos1xfloppy='dos1xfloppy'}]}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="e2b473b48716b33a2ca590a0524dc913", 0xffff}, 0x1c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") 14:36:34 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) [ 578.469613] FAT-fs (loop2): bogus number of reserved sectors [ 578.485041] FAT-fs (loop2): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 578.493955] FAT-fs (loop2): Can't find a valid FAT filesystem 14:36:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:35 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x0, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:36:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:36:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:37:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb23"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:35 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x0, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:37:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x1, 0x80000000) 14:37:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:36 executing program 2: syz_mount_image$msdos(&(0x7f00000003c0)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@fat=@check_normal='check=normal'}, {@fat=@dos1xfloppy='dos1xfloppy'}]}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="e2b473b48716b33a2ca590a0524dc913", 0xffff}, 0x1c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") 14:37:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:37:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:39 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x0, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:37:40 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:37:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:40 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:37:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:40 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:37:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x1, 0x80000000) 14:37:43 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000), 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:37:43 executing program 2: syz_mount_image$msdos(&(0x7f00000003c0)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@fat=@check_normal='check=normal'}, {@fat=@dos1xfloppy='dos1xfloppy'}]}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="e2b473b48716b33a2ca590a0524dc913", 0xffff}, 0x1c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") 14:37:43 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:43 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) [ 647.636004] FAT-fs (loop2): bogus number of reserved sectors [ 647.646887] FAT-fs (loop2): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 647.661077] FAT-fs (loop2): Can't find a valid FAT filesystem 14:37:43 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000), 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:37:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x1, 0x80000000) 14:37:43 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:43 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) [ 648.124743] FAT-fs (loop2): bogus number of reserved sectors [ 648.143272] FAT-fs (loop2): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 648.177114] FAT-fs (loop2): Can't find a valid FAT filesystem 14:37:44 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:44 executing program 3: 14:37:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:44 executing program 2: syz_mount_image$msdos(&(0x7f00000003c0)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@fat=@check_normal='check=normal'}, {@fat=@dos1xfloppy='dos1xfloppy'}]}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="e2b473b48716b33a2ca590a0524dc913", 0xffff}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) 14:37:44 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000), 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:37:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:37:44 executing program 3: 14:37:44 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:37:44 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:44 executing program 3: 14:37:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:44 executing program 3: 14:37:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:37:44 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:44 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) [ 648.930182] FAT-fs (loop2): bogus number of reserved sectors [ 648.936027] FAT-fs (loop2): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 648.959137] FAT-fs (loop2): Can't find a valid FAT filesystem 14:37:45 executing program 2: syz_mount_image$msdos(&(0x7f00000003c0)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@fat=@check_normal='check=normal'}, {@fat=@dos1xfloppy='dos1xfloppy'}]}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="e2b473b48716b33a2ca590a0524dc913", 0xffff}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) 14:37:45 executing program 3: 14:37:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:37:45 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:37:45 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:45 executing program 3: 14:37:45 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) [ 649.398928] FAT-fs (loop2): bogus number of reserved sectors [ 649.438885] FAT-fs (loop2): This doesn't look like a DOS 1.x volume; no bootstrapping code 14:37:45 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) [ 649.449848] FAT-fs (loop2): Can't find a valid FAT filesystem 14:37:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:45 executing program 2: syz_mount_image$msdos(&(0x7f00000003c0)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@fat=@check_normal='check=normal'}, {@fat=@dos1xfloppy='dos1xfloppy'}]}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="e2b473b48716b33a2ca590a0524dc913", 0xffff}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) 14:37:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:37:45 executing program 3: r0 = memfd_create(&(0x7f0000000140)='dev ', 0x7) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 14:37:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x1, 0x80000000) 14:37:45 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:37:45 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:37:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="e7ff0003080027aa02007d"], 0xb) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 14:37:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) [ 649.806975] FAT-fs (loop2): bogus number of reserved sectors [ 649.816347] FAT-fs (loop2): This doesn't look like a DOS 1.x volume; no bootstrapping code 14:37:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) [ 649.849799] FAT-fs (loop2): Can't find a valid FAT filesystem 14:37:45 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:37:45 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:45 executing program 2: syz_mount_image$msdos(&(0x7f00000003c0)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@fat=@check_normal='check=normal'}, {@fat=@dos1xfloppy='dos1xfloppy'}]}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="e2b473b48716b33a2ca590a0524dc913", 0xffff}, 0x1c) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") [ 649.991324] FAT-fs (loop3): codepage cp437 not found 14:37:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:46 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, 0x0, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:37:46 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) [ 650.234377] FAT-fs (loop2): bogus number of reserved sectors [ 650.242996] FAT-fs (loop2): This doesn't look like a DOS 1.x volume; no bootstrapping code 14:37:46 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, 0x0, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:37:46 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) [ 650.299763] FAT-fs (loop2): Can't find a valid FAT filesystem 14:37:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f0000000480)="f0f54ea9a03a4417bdf8c6bd138b0edf501b1b0b88cde5d467fed5a7ab4f3a87c61f8e9096e7cf415b5ce07fbb08d205bfcfdbdd576b7fed576aff10c79957455682d24f77bfe2ca06a56dc93d1d5b0c20013a5c895d094c1410578e550f83e39b941ab6178d8ebce3c5a0ed7405063f4d9c0a2d9bfe43b651ced41762f0e2017e203326f444ee7cf03c41ac8df39c648bd2951f9be4c276e218c93760f4183fc1faba852b35c52cae23b57a86b2ef4b05b367b5d9ecc3835c81ce0689638fcdbd6741081dd352461779e984c1078453f74a63fd88febd44cf7755f2fe563e0fbec78aca52e913271ee262072a624684122c6082000a463ee4ff5877f623db84cb5ecfd94bf28443f3bdb1c0223f0aaa5ca34bd2a7cf6fadd8d95a388c976a4be4dabd19a08d7e3917e6935a5e6e334674a48d9a9f928e930a238311c937b3149f6a88fb88dcb6a365f4ff12ff9ac820884422af36200b0e6fd72177bfde88240dd08787f254b992127e64dc628c8a68138546c1de548ac775deb022cb4dcc0875c8b821270d6072f4c25a437654d86074f8cafffa5917efe079426c70b322ca18b0fe7bec0d53c163670ebdfdd924a44c244c55f5dbe5818d6a7694595ea12ab2563464ba48d798d461aa01ba2d981376240f5075d87ad7bf63930e5955c1968b84cab61e4f1a713034e8ae66a41c03bb6ea55cba9c75c5c11c489f76ca", 0x1fe, 0x2}]) 14:37:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:46 executing program 2: syz_mount_image$msdos(&(0x7f00000003c0)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@fat=@check_normal='check=normal'}, {@fat=@dos1xfloppy='dos1xfloppy'}]}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="e2b473b48716b33a2ca590a0524dc913", 0xffff}, 0x1c) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") 14:37:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:37:46 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:46 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, 0x0, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) 14:37:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:46 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:46 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r1, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8", 0x34, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) [ 650.970325] FAT-fs (loop2): bogus number of reserved sectors [ 650.992645] FAT-fs (loop2): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 651.003396] FAT-fs (loop2): Can't find a valid FAT filesystem 14:37:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000e1000000da1c049948ec92b70db03d4042665c9e1ebcbfcd492e393019dee862429d922ac79c597f15c110191802cc7ad6f829696af5197d85d16b4d75003b605b8399d524229f51dc9eb09ee9de83919462477b75393a5a8158d8254c36bd3a777be707478c2a5ddf67a16950eb9dd25c97d9b75c9a8d79d8e6f55b73a0ee8ea9473a2634476527f4c242ff0dcf27f2b9360627faf8887ed03b1954ff990c2f72953e00acdae1599a06ba05e7eb192eeeeba402e33baa230a9da0e0605a9238685e7777f7065fae33f5dd03888928be672519bffc7b3a28f08cad09a88f84608861527b46e687415ced8a352e61fbe91bab34f2ef21649241bb6baacc5dda00d2f742d0c7b3a5f5914ef2a13a855918e6821e06d087a2955cdad2ca35514946fd31776c0944beb2f683836f224b02eea07f240397d12117f6c9f6d5b4e8ca9d63eb9a8c001839d643ae4e6b4d037dd854ad9cbd22c26770589da45673a3212b932efb2328f7b18484c82a04"], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) listen(r0, 0x7fff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(r3, 0x2, 0x1) pwritev(r1, &(0x7f0000001b40), 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed788c", 0x6f, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$packet_int(r4, 0x107, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) 14:37:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x1e06d73802273095) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7641e7fb28185c9d608932c85d62792a239002c70a1ddc4ff9e93794449b929f565da41b9155a3f4b69dbf4379f15ddcb1d95beb82eed78", 0x6e, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'gretap0\x00', r4}) 14:37:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x18<]\xb7H8V\xd1SP\xfa`\xd5)\x8d\xcbG\x0fH\\\x8d\x8awr\xc9\x91VB\x11\xd8\x9e~3\xf1\x87\xa3\xc6$V.\x0f\xbe\xcccbY\x10\x8f\x05\xfaH$_\xa6u\xc6\"\x16k\x16\xc3\x94]\xb3\xd63V\x1d\x19\x02H\xbc\xf2ic\x9d\xdd\bq\xf9\xc0\xf7\x9f\x8d\xf6\xfe\x1d\x9e+Kf\x06s\x19rJG\xa1d\xc6\xe1\x03\xf4m \xe6Re\x1c-\xf4\xdd\x98\xa4p2*u\xd1mW\xaa\xb8\xaa\x17\x1b\xea\xa9\nzF\xead\xdfov\xaa\x9fQ\xb4\xd3U\xd7\xd4\x88[\x1f-g\xbc\xf9\xb9\xd2\xf6\x12\x04\xdc3i\x8e~!\x99\xe4\xfb\xd2\xfb\xa7lgj\x87\xed\xcb\xdf\x91\xaf\x16xG3;\xb6lXN~\x83\xcb]\x1cIL\x91pH\r\x997\xde^\x9e\a\xc0L\x01\x93}c\xe84\xa4j\x00\x00\x00\xd8\xd0\x88R\x17\xcb+]\x1fe\x12\x8a2\xb1469\xa2\x19\x02\xd2\xc6\xe9\xe5\x006\\@\x96\x10C\xe5\xe697\xe4\x12\xb0\x9bi\x8aB\n\x7f\x7f\xb0\x9dL\x87\x8f') ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setflags(r2, 0x2, 0x1) add_key$user(0x0, 0x0, &(0x7f0000001c00)="e27bc7eb7efc9fadf2318a3f80dd5d79bffa2bfb689966f96dff02d81002a7f2ba567caac18a4bd036bdbace5270cbbe7a9455c8a270d7", 0x37, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @multicast1}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'gretap0\x00', r3}) [ 858.070219] INFO: task syz-executor0:27865 blocked for more than 140 seconds. [ 858.077617] Not tainted 4.14.96+ #19 [ 858.082310] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 858.090394] syz-executor0 D25096 27865 1 0x00000004 [ 858.096082] Call Trace: [ 858.098658] ? __schedule+0x91c/0x1f30 [ 858.102563] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 858.108443] ? __sched_text_start+0x8/0x8 [ 858.112644] ? lock_downgrade+0x5d0/0x5d0 [ 858.116818] ? lock_acquire+0x10f/0x380 [ 858.120830] ? __mutex_lock+0x2c1/0x1430 [ 858.124910] schedule+0x92/0x1c0 [ 858.128282] schedule_preempt_disabled+0x13/0x20 [ 858.133052] __mutex_lock+0x559/0x1430 [ 858.136942] ? lock_acquire+0x10f/0x380 [ 858.140939] ? kobj_lookup+0x261/0x410 [ 858.144823] ? loop_probe+0x73/0x180 [ 858.148517] ? __ww_mutex_wakeup_for_backoff+0x210/0x210 [ 858.153986] ? lock_downgrade+0x5d0/0x5d0 [ 858.158131] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 858.162652] ? __mutex_unlock_slowpath+0x9a/0x7d0 [ 858.167495] ? loop_probe+0x73/0x180 [ 858.171226] loop_probe+0x73/0x180 [ 858.174759] ? loop_lookup+0xc0/0xc0 [ 858.178458] ? __lock_acquire+0x56a/0x3fa0 [ 858.182714] kobj_lookup+0x226/0x410 [ 858.186442] ? loop_lookup+0xc0/0xc0 [ 858.190180] get_gendisk+0x36/0x240 [ 858.193814] __blkdev_get+0x345/0xf90 [ 858.197598] ? __blkdev_put+0x6d0/0x6d0 [ 858.201601] ? bdget+0x41a/0x4e0 [ 858.205042] ? lock_downgrade+0x5d0/0x5d0 [ 858.209185] blkdev_get+0x97/0x8b0 [ 858.213172] ? bd_acquire+0x149/0x2c0 [ 858.216959] ? bd_may_claim+0xd0/0xd0 [ 858.220862] ? lock_downgrade+0x5d0/0x5d0 [ 858.225030] ? lock_acquire+0x10f/0x380 [ 858.229021] ? bd_acquire+0x113/0x2c0 [ 858.232870] blkdev_open+0x1cc/0x250 [ 858.236617] ? security_file_open+0x88/0x190 [ 858.241044] do_dentry_open+0x41b/0xd60 [ 858.245017] ? bd_acquire+0x2c0/0x2c0 [ 858.248803] vfs_open+0x105/0x230 [ 858.252279] path_openat+0xb6b/0x2b70 [ 858.256080] ? path_mountpoint+0x9a0/0x9a0 [ 858.260335] ? trace_hardirqs_on+0x10/0x10 [ 858.264569] do_filp_open+0x1a1/0x280 [ 858.270561] ? may_open_dev+0xe0/0xe0 [ 858.274644] ? lock_downgrade+0x5d0/0x5d0 [ 858.274652] ? lock_acquire+0x10f/0x380 [ 858.274668] ? __alloc_fd+0x3f/0x490 [ 858.287124] ? _raw_spin_unlock+0x29/0x40 [ 858.291352] ? __alloc_fd+0x1bf/0x490 [ 858.295179] do_sys_open+0x2ca/0x590 [ 858.295192] ? filp_open+0x60/0x60 [ 858.303629] ? SyS_mkdirat+0x146/0x220 [ 858.307528] ? _raw_spin_unlock_irq+0x35/0x50 [ 858.314845] ? do_syscall_64+0x43/0x4b0 [ 858.318835] ? do_sys_open+0x590/0x590 [ 858.332754] do_syscall_64+0x19b/0x4b0 [ 858.336867] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 858.342704] INFO: task syz-executor2:28906 blocked for more than 140 seconds. [ 858.349959] Not tainted 4.14.96+ #19 [ 858.354392] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 858.362389] syz-executor2 D28160 28906 27954 0x00000004 [ 858.368029] Call Trace: [ 858.370739] ? __schedule+0x91c/0x1f30 [ 858.374632] ? __sched_text_start+0x8/0x8 [ 858.378754] ? lock_downgrade+0x5d0/0x5d0 [ 858.383025] ? lock_acquire+0x10f/0x380 [ 858.386993] ? __mutex_lock+0x2c1/0x1430 [ 858.391132] schedule+0x92/0x1c0 [ 858.394492] schedule_preempt_disabled+0x13/0x20 [ 858.399231] __mutex_lock+0x559/0x1430 [ 858.403217] ? trace_hardirqs_on+0x10/0x10 [ 858.407448] ? lo_release+0x19/0x170 [ 858.411284] ? __ww_mutex_wakeup_for_backoff+0x210/0x210 [ 858.416736] ? lock_downgrade+0x5d0/0x5d0 [ 858.420948] ? lock_acquire+0x10f/0x380 [ 858.424919] ? __blkdev_put+0x1cb/0x6d0 [ 858.428868] ? lo_compat_ioctl+0x130/0x130 [ 858.433173] ? lo_release+0x19/0x170 [ 858.436889] lo_release+0x19/0x170 [ 858.440513] ? lo_compat_ioctl+0x130/0x130 [ 858.444739] __blkdev_put+0x518/0x6d0 [ 858.448519] ? bd_set_size+0xb0/0xb0 [ 858.452308] ? blkdev_put+0x75/0x4c0 [ 858.456017] ? blkdev_put+0x4c0/0x4c0 [ 858.459802] blkdev_close+0x86/0xb0 [ 858.463520] __fput+0x25e/0x700 [ 858.466795] task_work_run+0x118/0x190 [ 858.471058] exit_to_usermode_loop+0x13b/0x160 [ 858.475632] do_syscall_64+0x372/0x4b0 [ 858.479498] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 858.484938] INFO: task syz-executor3:28921 blocked for more than 140 seconds. [ 858.492206] Not tainted 4.14.96+ #19 [ 858.496417] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 858.504436] syz-executor3 D27800 28921 27956 0x00000004 [ 858.510173] Call Trace: [ 858.512747] ? __schedule+0x91c/0x1f30 [ 858.516623] ? __sched_text_start+0x8/0x8 [ 858.520917] ? lock_downgrade+0x5d0/0x5d0 [ 858.525071] ? lock_acquire+0x10f/0x380 [ 858.529021] ? __mutex_lock+0x2c1/0x1430 [ 858.533164] schedule+0x92/0x1c0 [ 858.536528] schedule_preempt_disabled+0x13/0x20 [ 858.541367] __mutex_lock+0x559/0x1430 [ 858.545254] ? blkdev_reread_part+0x1b/0x40 [ 858.549570] ? mark_lock+0xfa0/0xfa0 [ 858.553478] ? __ww_mutex_wakeup_for_backoff+0x210/0x210 [ 858.558927] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 858.564099] ? __wake_up_common_lock+0xe0/0x170 [ 858.568862] ? blkdev_reread_part+0x1b/0x40 [ 858.573248] blkdev_reread_part+0x1b/0x40 [ 858.577390] loop_reread_partitions+0x72/0x80 [ 858.581949] loop_set_status+0xbff/0x11f0 [ 858.586105] ? loop_set_status64+0xa5/0x100 [ 858.590491] ? loop_set_status_old+0x2f0/0x2f0 [ 858.595070] ? lo_ioctl+0x83/0x1970 [ 858.598690] ? lo_ioctl+0x50b/0x1970 [ 858.602935] ? loop_clr_fd+0xac0/0xac0 [ 858.606821] ? blkdev_ioctl+0x4d9/0x1810 [ 858.610948] ? blkpg_ioctl+0x910/0x910 [ 858.614838] ? lock_downgrade+0x5d0/0x5d0 [ 858.618967] ? lock_acquire+0x10f/0x380 [ 858.623017] ? debug_check_no_obj_freed+0x148/0x5c0 [ 858.628045] ? block_ioctl+0xd9/0x120 [ 858.632022] ? blkdev_fallocate+0x3b0/0x3b0 [ 858.636355] ? do_vfs_ioctl+0xabe/0x1040 [ 858.640494] ? selinux_file_ioctl+0x426/0x590 [ 858.645055] ? selinux_file_ioctl+0x116/0x590 [ 858.649536] ? ioctl_preallocate+0x1e0/0x1e0 [ 858.654048] ? selinux_parse_skb.constprop.0+0x16b0/0x16b0 [ 858.659666] ? __fget+0x1ff/0x360 [ 858.663191] ? lock_downgrade+0x5d0/0x5d0 [ 858.667342] ? lock_acquire+0x10f/0x380 [ 858.671511] ? __fget+0x44/0x360 [ 858.674877] ? check_preemption_disabled+0x35/0x1f0 [ 858.679880] ? security_file_ioctl+0x7c/0xb0 [ 858.684366] ? SyS_ioctl+0x7f/0xb0 [ 858.687904] ? do_vfs_ioctl+0x1040/0x1040 [ 858.692116] ? do_syscall_64+0x19b/0x4b0 [ 858.696179] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 858.701620] INFO: task syz-executor3:28937 blocked for more than 140 seconds. [ 858.708883] Not tainted 4.14.96+ #19 [ 858.713211] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 858.721186] syz-executor3 D29152 28937 27956 0x00000004 [ 858.726795] Call Trace: [ 858.729359] ? __schedule+0x91c/0x1f30 [ 858.733736] ? __sched_text_start+0x8/0x8 [ 858.737882] ? lock_downgrade+0x5d0/0x5d0 [ 858.742090] ? lock_acquire+0x10f/0x380 [ 858.746057] ? __mutex_lock+0x2c1/0x1430 [ 858.750190] schedule+0x92/0x1c0 [ 858.753551] schedule_preempt_disabled+0x13/0x20 [ 858.758281] __mutex_lock+0x559/0x1430 [ 858.762229] ? __mutex_unlock_slowpath+0x9a/0x7d0 [ 858.767064] ? trace_hardirqs_on+0x10/0x10 [ 858.771359] ? __blkdev_get+0xf3/0xf90 [ 858.775244] ? refcount_inc_not_zero+0x81/0xe0 [ 858.779888] ? __ww_mutex_wakeup_for_backoff+0x210/0x210 [ 858.785437] ? kobject_get_unless_zero+0x27/0x40 [ 858.790210] ? get_disk+0xd0/0xd0 [ 858.793650] ? exact_match+0x9/0x20 [ 858.797270] ? kobj_lookup+0x325/0x410 [ 858.801283] ? blkdev_ioctl+0x1810/0x1810 [ 858.805440] ? __blkdev_get+0xf3/0xf90 [ 858.809314] __blkdev_get+0xf3/0xf90 [ 858.813136] ? __blkdev_put+0x6d0/0x6d0 [ 858.817147] ? fsnotify+0x824/0x10c0 [ 858.820957] blkdev_get+0x97/0x8b0 [ 858.824498] ? bd_acquire+0x171/0x2c0 [ 858.828273] ? bd_may_claim+0xd0/0xd0 [ 858.832152] ? lock_downgrade+0x5d0/0x5d0 [ 858.836305] ? lock_acquire+0x10f/0x380 [ 858.840371] ? bd_acquire+0x21/0x2c0 [ 858.844087] blkdev_open+0x1cc/0x250 [ 858.847790] ? security_file_open+0x88/0x190 [ 858.852280] do_dentry_open+0x41b/0xd60 [ 858.856245] ? bd_acquire+0x2c0/0x2c0 [ 858.860455] vfs_open+0x105/0x230 [ 858.863900] path_openat+0xb6b/0x2b70 [ 858.867688] ? path_mountpoint+0x9a0/0x9a0 [ 858.871940] ? trace_hardirqs_on+0x10/0x10 [ 858.876173] do_filp_open+0x1a1/0x280 [ 858.879949] ? may_open_dev+0xe0/0xe0 [ 858.883783] ? lock_downgrade+0x5d0/0x5d0 [ 858.887926] ? lock_acquire+0x10f/0x380 [ 858.891929] ? __alloc_fd+0x3f/0x490 [ 858.895643] ? _raw_spin_unlock+0x29/0x40 [ 858.899773] ? __alloc_fd+0x1bf/0x490 [ 858.903613] do_sys_open+0x2ca/0x590 [ 858.907371] ? filp_open+0x60/0x60 [ 858.910958] ? fput+0xb/0x140 [ 858.914073] ? SyS_pwrite64+0xda/0x160 [ 858.917936] ? fput+0xb/0x140 [ 858.921058] ? do_syscall_64+0x43/0x4b0 [ 858.925028] ? do_sys_open+0x590/0x590 [ 858.928896] do_syscall_64+0x19b/0x4b0 [ 858.932819] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 858.938192] INFO: task blkid:28914 blocked for more than 140 seconds. [ 858.944970] Not tainted 4.14.96+ #19 [ 858.949199] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 858.957182] blkid D27800 28914 2791 0x00000004 [ 858.962841] Call Trace: [ 858.965418] ? __schedule+0x91c/0x1f30 [ 858.969301] ? __sched_text_start+0x8/0x8 [ 858.973472] ? lock_downgrade+0x5d0/0x5d0 [ 858.977631] ? lock_acquire+0x10f/0x380 [ 858.981620] ? __mutex_lock+0x2c1/0x1430 [ 858.985675] schedule+0x92/0x1c0 [ 858.989016] schedule_preempt_disabled+0x13/0x20 [ 858.994184] __mutex_lock+0x559/0x1430 [ 858.998061] ? lo_release+0x19/0x170 [ 859.001820] ? __ww_mutex_wakeup_for_backoff+0x210/0x210 [ 859.007271] ? lock_downgrade+0x5d0/0x5d0 [ 859.011453] ? trace_hardirqs_on+0x10/0x10 [ 859.015681] ? lo_compat_ioctl+0x130/0x130 [ 859.019892] ? lo_release+0x19/0x170 [ 859.023621] lo_release+0x19/0x170 [ 859.027153] ? lo_compat_ioctl+0x130/0x130 [ 859.031426] __blkdev_put+0x518/0x6d0 [ 859.035231] ? bd_set_size+0xb0/0xb0 [ 859.038926] ? blkdev_put+0x75/0x4c0 [ 859.042655] ? blkdev_put+0x4c0/0x4c0 [ 859.046559] blkdev_close+0x86/0xb0 [ 859.050211] __fput+0x25e/0x700 [ 859.053479] task_work_run+0x118/0x190 [ 859.057344] exit_to_usermode_loop+0x13b/0x160 [ 859.061943] do_syscall_64+0x372/0x4b0 [ 859.065817] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 859.071195] INFO: task blkid:28934 blocked for more than 140 seconds. [ 859.077748] Not tainted 4.14.96+ #19 [ 859.081985] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 859.089928] blkid D28448 28934 308 0x00000004 [ 859.095563] Call Trace: [ 859.098132] ? __schedule+0x91c/0x1f30 [ 859.102028] ? __sched_text_start+0x8/0x8 [ 859.106157] ? lock_downgrade+0x5d0/0x5d0 [ 859.110332] ? lock_acquire+0x10f/0x380 [ 859.114341] ? __mutex_lock+0x2c1/0x1430 [ 859.118395] schedule+0x92/0x1c0 [ 859.122081] schedule_preempt_disabled+0x13/0x20 [ 859.126821] __mutex_lock+0x559/0x1430 [ 859.130743] ? __mutex_unlock_slowpath+0x9a/0x7d0 [ 859.135604] ? trace_hardirqs_on+0x10/0x10 [ 859.139818] ? __blkdev_get+0xf3/0xf90 [ 859.143730] ? refcount_inc_not_zero+0x81/0xe0 [ 859.148320] ? __ww_mutex_wakeup_for_backoff+0x210/0x210 [ 859.153806] ? kobject_get_unless_zero+0x27/0x40 [ 859.158669] ? get_disk+0xd0/0xd0 [ 859.162149] ? exact_match+0x9/0x20 [ 859.165902] ? kobj_lookup+0x325/0x410 [ 859.169803] ? blkdev_ioctl+0x1810/0x1810 [ 859.174101] ? __blkdev_get+0xf3/0xf90 [ 859.177987] __blkdev_get+0xf3/0xf90 [ 859.181729] ? __blkdev_put+0x6d0/0x6d0 [ 859.185712] ? fsnotify+0x824/0x10c0 [ 859.189404] blkdev_get+0x97/0x8b0 [ 859.192977] ? bd_acquire+0x171/0x2c0 [ 859.196783] ? bd_may_claim+0xd0/0xd0 [ 859.200728] ? lock_downgrade+0x5d0/0x5d0 [ 859.204946] ? lock_acquire+0x10f/0x380 [ 859.208919] ? bd_acquire+0x21/0x2c0 [ 859.212668] blkdev_open+0x1cc/0x250 [ 859.216385] ? security_file_open+0x88/0x190 [ 859.220842] do_dentry_open+0x41b/0xd60 [ 859.224827] ? bd_acquire+0x2c0/0x2c0 [ 859.228611] vfs_open+0x105/0x230 [ 859.232087] path_openat+0xb6b/0x2b70 [ 859.235894] ? path_mountpoint+0x9a0/0x9a0 [ 859.240150] ? trace_hardirqs_on+0x10/0x10 [ 859.244388] do_filp_open+0x1a1/0x280 [ 859.248217] ? may_open_dev+0xe0/0xe0 [ 859.252476] ? lock_downgrade+0x5d0/0x5d0 [ 859.256612] ? lock_acquire+0x10f/0x380 [ 859.260603] ? __alloc_fd+0x3f/0x490 [ 859.264320] ? _raw_spin_unlock+0x29/0x40 [ 859.268443] ? __alloc_fd+0x1bf/0x490 [ 859.272298] do_sys_open+0x2ca/0x590 [ 859.276024] ? filp_open+0x60/0x60 [ 859.279568] ? do_syscall_64+0x43/0x4b0 [ 859.283570] ? do_sys_open+0x590/0x590 [ 859.287453] do_syscall_64+0x19b/0x4b0 [ 859.291367] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 859.296752] [ 859.296752] Showing all locks held in the system: [ 859.303240] 1 lock held by khungtaskd/23: [ 859.307430] #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7c/0x21a [ 859.316497] 2 locks held by getty/1760: [ 859.320523] #0: (&tty->ldisc_sem){++++}, at: [] tty_ldisc_ref_wait+0x22/0x80 [ 859.329567] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1f7/0x1700 [ 859.339050] 1 lock held by syz-executor0/27865: [ 859.344268] #0: (loop_ctl_mutex){+.+.}, at: [] loop_probe+0x73/0x180 [ 859.352545] 2 locks held by syz-executor2/28906: [ 859.357305] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_put+0xb1/0x6d0 [ 859.365821] #1: (loop_ctl_mutex){+.+.}, at: [] lo_release+0x19/0x170 [ 859.374089] 2 locks held by syz-executor3/28921: [ 859.378824] #0: (loop_ctl_mutex/1){+.+.}, at: [] lo_ioctl+0x83/0x1970 [ 859.387179] #1: (&bdev->bd_mutex){+.+.}, at: [] blkdev_reread_part+0x1b/0x40 [ 859.396137] 1 lock held by syz-executor3/28937: [ 859.400826] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0xf3/0xf90 [ 859.409342] 2 locks held by blkid/28914: [ 859.413413] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_put+0xb1/0x6d0 [ 859.421937] #1: (loop_ctl_mutex){+.+.}, at: [] lo_release+0x19/0x170 [ 859.430196] 1 lock held by blkid/28934: [ 859.434156] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0xf3/0xf90 [ 859.442667] [ 859.444285] ============================================= [ 859.444285] [ 859.451533] NMI backtrace for cpu 0 [ 859.455165] CPU: 0 PID: 23 Comm: khungtaskd Not tainted 4.14.96+ #19 [ 859.461627] Call Trace: [ 859.464191] dump_stack+0xb9/0x10e [ 859.467717] ? irq_force_complete_move+0x271/0x2e5 [ 859.472624] nmi_cpu_backtrace.cold+0x47/0x86 [ 859.477094] ? irq_force_complete_move.cold+0x7b/0x7b [ 859.482258] ? nmi_trigger_cpumask_backtrace+0x119/0x147 [ 859.487684] ? watchdog+0x56c/0xa90 [ 859.491306] ? reset_hung_task_detector+0x10/0x10 [ 859.496128] ? kthread+0x310/0x420 [ 859.499641] ? kthread_create_on_node+0xf0/0xf0 [ 859.504287] ? ret_from_fork+0x3a/0x50 [ 859.508269] Sending NMI from CPU 0 to CPUs 1: [ 859.512820] NMI backtrace for cpu 1 skipped: idling at pc 0xffffffffb16503b2 [ 859.513791] Kernel panic - not syncing: hung_task: blocked tasks [ 859.526150] CPU: 0 PID: 23 Comm: khungtaskd Not tainted 4.14.96+ #19 [ 859.532613] Call Trace: [ 859.535179] dump_stack+0xb9/0x10e [ 859.538697] panic+0x1d9/0x3c2 [ 859.541868] ? add_taint.cold+0x16/0x16 [ 859.545822] ? irq_force_complete_move.cold+0x7b/0x7b [ 859.551199] ? ___preempt_schedule+0x16/0x18 [ 859.555589] watchdog+0x57d/0xa90 [ 859.559020] ? reset_hung_task_detector+0x10/0x10 [ 859.563907] kthread+0x310/0x420 [ 859.567257] ? kthread_create_on_node+0xf0/0xf0 [ 859.571913] ret_from_fork+0x3a/0x50 [ 859.575994] Kernel Offset: 0x2ee00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 859.587006] Rebooting in 86400 seconds..